| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/common/content_switches.h" | 5 #include "content/common/content_switches.h" |
| 6 | 6 |
| 7 namespace switches { | 7 namespace switches { |
| 8 | 8 |
| 9 // By default, file:// URIs cannot read other file:// URIs. This is an | 9 // By default, file:// URIs cannot read other file:// URIs. This is an |
| 10 // override for developers who need the old behavior for testing. | 10 // override for developers who need the old behavior for testing. |
| 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
| 12 | 12 |
| 13 // By default, an https page cannot run JavaScript, CSS or plug-ins from http | |
| 14 // URLs. This provides an override to get the old insecure behavior. | |
| 15 const char kAllowRunningInsecureContent[] = "allow-running-insecure-content"; | |
| 16 | |
| 17 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). | 13 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). |
| 18 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; | 14 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; |
| 19 | 15 |
| 20 // Enumerates and prints a child process' most dangerous handles when it | 16 // Enumerates and prints a child process' most dangerous handles when it |
| 21 // is terminated. | 17 // is terminated. |
| 22 const char kAuditHandles[] = "enable-handle-auditing"; | 18 const char kAuditHandles[] = "enable-handle-auditing"; |
| 23 | 19 |
| 24 // The same as kAuditHandles except all handles are enumerated. | 20 // The same as kAuditHandles except all handles are enumerated. |
| 25 const char kAuditAllHandles[] = "enable-handle-auditing-all"; | 21 const char kAuditAllHandles[] = "enable-handle-auditing-all"; |
| 26 | 22 |
| (...skipping 288 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 315 // That is temporary until we are sure low latency works and remove old code. | 311 // That is temporary until we are sure low latency works and remove old code. |
| 316 const char kHighLatencyAudio[] = "disable-low-latency-audio"; | 312 const char kHighLatencyAudio[] = "disable-low-latency-audio"; |
| 317 | 313 |
| 318 // Causes the process to run as a NativeClient broker | 314 // Causes the process to run as a NativeClient broker |
| 319 // (used for launching NaCl loader processes on 64-bit Windows). | 315 // (used for launching NaCl loader processes on 64-bit Windows). |
| 320 const char kNaClBrokerProcess[] = "nacl-broker"; | 316 const char kNaClBrokerProcess[] = "nacl-broker"; |
| 321 | 317 |
| 322 // Causes the process to run as a NativeClient loader. | 318 // Causes the process to run as a NativeClient loader. |
| 323 const char kNaClLoaderProcess[] = "nacl-loader"; | 319 const char kNaClLoaderProcess[] = "nacl-loader"; |
| 324 | 320 |
| 325 // By default, an https page can load images, fonts or frames from an http page. | |
| 326 // This switch overrides this to block this lesser mixed-content problem. | |
| 327 const char kNoDisplayingInsecureContent[] = "no-displaying-insecure-content"; | |
| 328 | |
| 329 // Support a separate switch that enables the v8 playback extension. | 321 // Support a separate switch that enables the v8 playback extension. |
| 330 // The extension causes javascript calls to Date.now() and Math.random() | 322 // The extension causes javascript calls to Date.now() and Math.random() |
| 331 // to return consistent values, such that subsequent loads of the same | 323 // to return consistent values, such that subsequent loads of the same |
| 332 // page will result in consistent js-generated data and XHR requests. | 324 // page will result in consistent js-generated data and XHR requests. |
| 333 // Pages may still be able to generate inconsistent data from plugins. | 325 // Pages may still be able to generate inconsistent data from plugins. |
| 334 const char kNoJsRandomness[] = "no-js-randomness"; | 326 const char kNoJsRandomness[] = "no-js-randomness"; |
| 335 | 327 |
| 336 // Don't send HTTP-Referer headers. | 328 // Don't send HTTP-Referer headers. |
| 337 const char kNoReferrers[] = "no-referrers"; | 329 const char kNoReferrers[] = "no-referrers"; |
| 338 | 330 |
| (...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 501 // instead of NSS for SSL. | 493 // instead of NSS for SSL. |
| 502 const char kUseSystemSSL[] = "use-system-ssl"; | 494 const char kUseSystemSSL[] = "use-system-ssl"; |
| 503 #endif | 495 #endif |
| 504 | 496 |
| 505 #if !defined(OFFICIAL_BUILD) | 497 #if !defined(OFFICIAL_BUILD) |
| 506 // Causes the renderer process to throw an assertion on launch. | 498 // Causes the renderer process to throw an assertion on launch. |
| 507 const char kRendererCheckFalseTest[] = "renderer-check-false-test"; | 499 const char kRendererCheckFalseTest[] = "renderer-check-false-test"; |
| 508 #endif | 500 #endif |
| 509 | 501 |
| 510 } // namespace switches | 502 } // namespace switches |
| OLD | NEW |