Main Views
QA Views
About Transvision
BETA
Displaying 6 results for the string sandbox in cak:
Entity | cak | en-US |
---|---|---|
Entity
#
all locales
dom • chrome • security • security.properties BothAllowScriptsAndSameOriginPresent |
cak
Jun iframe ri k'o allow-script achi'el chuqa' allow-same-origin pa ri ruch'akulal sandbox nitikïr nik'is ri rub'anikil chi muqül.
|
en-US
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can remove its sandboxing.
|
Entity
#
all locales
dom • chrome • security • security.properties BothAllowTopNavigationAndUserActivationPresent |
cak
Jun iframe which ruk'wan allow-top-navigation chuqa' allow-top-navigation-by-user-activation richin ri rub'anikil sandbox xtuya' q'ij richin jun okem pa k'amaya'l pa ruwi'.
|
en-US
An iframe which has both allow-top-navigation and allow-top-navigation-by-user-activation for its sandbox attribute will permit top navigations.
|
Entity
#
all locales
dom • chrome • security • security.properties IframeSandboxBlockedDownload |
cak
Xq'ate' ri ruqasaxik “%S” ruma chi ri qupïy iframe ruk'wan sandbox.
|
en-US
Download of “%S” was blocked because the triggering iframe has the sandbox flag set.
|
Entity
#
all locales
toolkit • toolkit • about • aboutProcesses.ftl about-processes-remote-sandbox-broker-process |
cak
Näj Sandbox Broker ({ $pid })
|
en-US
Remote Sandbox Broker ({ $pid })
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl content-sandbox-level |
cak
Rupam b'eyal Sandbox rupalem
|
en-US
Content Process Sandbox Level
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl effective-content-sandbox-level |
cak
Rupam b'eyal Sandbox ütz rupalem
|
en-US
Effective Content Process Sandbox Level
|
Displaying 13 results for the string sandbox in en-US:
Entity | cak | en-US |
---|---|---|
Entity
#
all locales
dom • chrome • dom • dom.properties PointerLockDeniedSandboxed |
cak
Ri ruk'utuxik ruq'atik retal ch'oy xq'at ruma chi ri API richin ruq'atoj retal ch'oy niya' q'ij rik'in jun rukaxa sanayi'.
|
en-US
Request for pointer lock was denied because Pointer Lock API is restricted via sandbox.
|
Entity
#
all locales
dom • chrome • dom • dom.properties RequestStorageAccessNullPrincipal |
cak
document.requestStorageAccess() man tikirel ta nisik'ïx pa jun wuj rik'in jun tz'iltz'öj ruxe'el, rik'in jun jech'un rukojol iframe akuchi' man nuya' ta q'ij ri ruxe'el rik'in ri rub'anikil jech'un rukojol.
|
en-US
document.requestStorageAccess() may not be called on a document with an opaque origin, such as a sandboxed iframe without allow-same-origin in its sandbox attribute.
|
Entity
#
all locales
dom • chrome • dom • dom.properties RequestStorageAccessSandboxed |
cak
document.requestStorageAccess() man tikirel ta nisik'ïx pa jun jech'un rukojol iframe akuchi' man nuya' ta q'ij ri rokem yakb'äl rik'in rutzijik okisanel pa rub'anikil jech'un rukojol.
|
en-US
document.requestStorageAccess() may not be called in a sandboxed iframe without allow-storage-access-by-user-activation in its sandbox attribute.
|
Entity
#
all locales
dom • chrome • security • csp.properties couldntParseInvalidSandboxFlag |
cak
Man xnik'öx ta ri rulaqam ruk'ojlib'al chajinïk man okel ta ‘%1$S’
|
en-US
Couldn’t parse invalid sandbox flag ‘%1$S’
|
Entity
#
all locales
dom • chrome • security • csp.properties ignoringReportOnlyDirective |
cak
Choj niya' kan q'ij chi re ri chojminel rukaxa sanayai' toq choj nijach rik'in jun runa'ojil xa xe richin rutzijol samaj ‘%1$S’
|
en-US
Ignoring sandbox directive when delivered in a report-only policy ‘%1$S’
|
Entity
#
all locales
dom • chrome • security • security.properties BothAllowScriptsAndSameOriginPresent |
cak
Jun iframe ri k'o allow-script achi'el chuqa' allow-same-origin pa ri ruch'akulal sandbox nitikïr nik'is ri rub'anikil chi muqül.
|
en-US
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can remove its sandboxing.
|
Entity
#
all locales
dom • chrome • security • security.properties BothAllowTopNavigationAndUserActivationPresent |
cak
Jun iframe which ruk'wan allow-top-navigation chuqa' allow-top-navigation-by-user-activation richin ri rub'anikil sandbox xtuya' q'ij richin jun okem pa k'amaya'l pa ruwi'.
|
en-US
An iframe which has both allow-top-navigation and allow-top-navigation-by-user-activation for its sandbox attribute will permit top navigations.
|
Entity
#
all locales
dom • chrome • security • security.properties IframeSandboxBlockedDownload |
cak
Xq'ate' ri ruqasaxik “%S” ruma chi ri qupïy iframe ruk'wan sandbox.
|
en-US
Download of “%S” was blocked because the triggering iframe has the sandbox flag set.
|
Entity
#
all locales
toolkit • toolkit • about • aboutProcesses.ftl about-processes-remote-sandbox-broker-process |
cak
Näj Sandbox Broker ({ $pid })
|
en-US
Remote Sandbox Broker ({ $pid })
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl content-sandbox-level |
cak
Rupam b'eyal Sandbox rupalem
|
en-US
Content Process Sandbox Level
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl effective-content-sandbox-level |
cak
Rupam b'eyal Sandbox ütz rupalem
|
en-US
Effective Content Process Sandbox Level
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl sandbox-title |
cak
Tzayanib'äl
|
en-US
Sandbox
|
Entity
#
all locales
toolkit • toolkit • about • aboutSupport.ftl support-sandbox-gpu-level |
cak
Warning: Source string is missing
|
en-US
GPU Process Sandbox Level
|
APIThese results are also available as an API request to search in
cak or
en-US.
Learn more about the Transvision API.
Please enable JavaScript. Some features won't be available without it.