%endif
Summary: Google Chrome
Name: google-chrome%{?gcsuffix}
-Version: 87.0.4280.66
+Version: 119.0.6045.199
Release: 1
License: Multiple, see http://chrome.google.com/
Group: Applications/Networking
Source0: http://dl.google.com/linux/chrome/rpm/stable/x86_64/google-chrome-%{state}-%{version}-%{release}.x86_64.rpm
-# NoSource0-md5: 06bac7119dddc75da8712a73127047ae
+# NoSource0-md5: b3eabc34f8a5e8b561fc824b98f8e24d
NoSource: 0
Source1: google-chrome.sh
Source2: find-lang.sh
%{_libdir}/%{name}/MEIPreload
%{_libdir}/%{name}/icudtl.dat
%{_libdir}/%{name}/chrome_*_percent.pak
+%{_libdir}/%{name}/chrome-management-service
%{_libdir}/%{name}/resources.pak
%{_libdir}/%{name}/v8_context_snapshot.bin
%{_libdir}/%{name}/libEGL.so
%{_libdir}/%{name}/libGLESv2.so
+%{_libdir}/%{name}/liboptimization_guide_internal.so
+%{_libdir}/%{name}/libqt5_shim.so
+%{_libdir}/%{name}/libqt6_shim.so
+%{_libdir}/%{name}/libvulkan.so.1
%dir %{_libdir}/%{name}/locales
%{_libdir}/%{name}/locales/en-US.pak
#%{_libdir}/%{name}/locales/fake-bidi.pak
# These unique permissions are intentional and necessary for the sandboxing
%attr(4555,root,root) %{_libdir}/%{name}/chrome-sandbox
-%attr(755,root,root) %{_libdir}/%{name}/crashpad_handler
+%attr(755,root,root) %{_libdir}/%{name}/chrome_crashpad_handler
# nacl
%attr(755,root,root) %{_libdir}/%{name}/nacl_helper
# DRM
%attr(755,root,root) %{_libdir}/%{name}/libwidevinecdm.so
-# replace with mesa symlinks?
-%dir %{_libdir}/%{name}/swiftshader
-%attr(755,root,root) %{_libdir}/%{name}/swiftshader/libEGL.so
-%attr(755,root,root) %{_libdir}/%{name}/swiftshader/libGLESv2.so
-
# ffmpeg libs
%if %{with ffmpegsumo}
%attr(755,root,root) %{_libdir}/%{name}/libffmpegsumo.so
%endif
-%{_libdir}/%{name}/WidevineCdm
+%attr(755,root,root) %{_libdir}/%{name}/libvk_swiftshader.so
+%{_libdir}/%{name}/vk_swiftshader_icd.json
+%{_libdir}/%{name}/WidevineCdm
# hack
%dir /opt/google
/opt/google/chrome%{?gcsuffix}