Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(162)

Side by Side Diff: content/common/content_switches.cc

Issue 8080004: Fix bug where --allow-running-insecure-content flag doesn't work against google.com sites in stab... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: '' Created 9 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/content_switches.h" 5 #include "content/common/content_switches.h"
6 6
7 namespace switches { 7 namespace switches {
8 8
9 // By default, file:// URIs cannot read other file:// URIs. This is an 9 // By default, file:// URIs cannot read other file:// URIs. This is an
10 // override for developers who need the old behavior for testing. 10 // override for developers who need the old behavior for testing.
11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files";
12 12
13 // By default, an https page cannot run JavaScript, CSS or plug-ins from http
14 // URLs. This provides an override to get the old insecure behavior.
15 const char kAllowRunningInsecureContent[] = "allow-running-insecure-content";
16
17 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). 13 // Allows debugging of sandboxed processes (see zygote_main_linux.cc).
18 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; 14 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging";
19 15
20 // Enumerates and prints a child process' most dangerous handles when it 16 // Enumerates and prints a child process' most dangerous handles when it
21 // is terminated. 17 // is terminated.
22 const char kAuditHandles[] = "enable-handle-auditing"; 18 const char kAuditHandles[] = "enable-handle-auditing";
23 19
24 // The same as kAuditHandles except all handles are enumerated. 20 // The same as kAuditHandles except all handles are enumerated.
25 const char kAuditAllHandles[] = "enable-handle-auditing-all"; 21 const char kAuditAllHandles[] = "enable-handle-auditing-all";
26 22
(...skipping 288 matching lines...) Expand 10 before | Expand all | Expand 10 after
315 // That is temporary until we are sure low latency works and remove old code. 311 // That is temporary until we are sure low latency works and remove old code.
316 const char kHighLatencyAudio[] = "disable-low-latency-audio"; 312 const char kHighLatencyAudio[] = "disable-low-latency-audio";
317 313
318 // Causes the process to run as a NativeClient broker 314 // Causes the process to run as a NativeClient broker
319 // (used for launching NaCl loader processes on 64-bit Windows). 315 // (used for launching NaCl loader processes on 64-bit Windows).
320 const char kNaClBrokerProcess[] = "nacl-broker"; 316 const char kNaClBrokerProcess[] = "nacl-broker";
321 317
322 // Causes the process to run as a NativeClient loader. 318 // Causes the process to run as a NativeClient loader.
323 const char kNaClLoaderProcess[] = "nacl-loader"; 319 const char kNaClLoaderProcess[] = "nacl-loader";
324 320
325 // By default, an https page can load images, fonts or frames from an http page.
326 // This switch overrides this to block this lesser mixed-content problem.
327 const char kNoDisplayingInsecureContent[] = "no-displaying-insecure-content";
328
329 // Support a separate switch that enables the v8 playback extension. 321 // Support a separate switch that enables the v8 playback extension.
330 // The extension causes javascript calls to Date.now() and Math.random() 322 // The extension causes javascript calls to Date.now() and Math.random()
331 // to return consistent values, such that subsequent loads of the same 323 // to return consistent values, such that subsequent loads of the same
332 // page will result in consistent js-generated data and XHR requests. 324 // page will result in consistent js-generated data and XHR requests.
333 // Pages may still be able to generate inconsistent data from plugins. 325 // Pages may still be able to generate inconsistent data from plugins.
334 const char kNoJsRandomness[] = "no-js-randomness"; 326 const char kNoJsRandomness[] = "no-js-randomness";
335 327
336 // Don't send HTTP-Referer headers. 328 // Don't send HTTP-Referer headers.
337 const char kNoReferrers[] = "no-referrers"; 329 const char kNoReferrers[] = "no-referrers";
338 330
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after
501 // instead of NSS for SSL. 493 // instead of NSS for SSL.
502 const char kUseSystemSSL[] = "use-system-ssl"; 494 const char kUseSystemSSL[] = "use-system-ssl";
503 #endif 495 #endif
504 496
505 #if !defined(OFFICIAL_BUILD) 497 #if !defined(OFFICIAL_BUILD)
506 // Causes the renderer process to throw an assertion on launch. 498 // Causes the renderer process to throw an assertion on launch.
507 const char kRendererCheckFalseTest[] = "renderer-check-false-test"; 499 const char kRendererCheckFalseTest[] = "renderer-check-false-test";
508 #endif 500 #endif
509 501
510 } // namespace switches 502 } // namespace switches
OLDNEW
« chrome/renderer/chrome_render_view_observer.cc ('K') | « content/common/content_switches.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698