OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/common/content_switches.h" | 5 #include "content/common/content_switches.h" |
6 | 6 |
7 namespace switches { | 7 namespace switches { |
8 | 8 |
9 // By default, file:// URIs cannot read other file:// URIs. This is an | 9 // By default, file:// URIs cannot read other file:// URIs. This is an |
10 // override for developers who need the old behavior for testing. | 10 // override for developers who need the old behavior for testing. |
11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
12 | 12 |
13 // By default, an https page cannot run JavaScript, CSS or plug-ins from http | |
14 // URLs. This provides an override to get the old insecure behavior. | |
15 const char kAllowRunningInsecureContent[] = "allow-running-insecure-content"; | |
16 | |
17 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). | 13 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). |
18 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; | 14 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; |
19 | 15 |
20 // Enumerates and prints a child process' most dangerous handles when it | 16 // Enumerates and prints a child process' most dangerous handles when it |
21 // is terminated. | 17 // is terminated. |
22 const char kAuditHandles[] = "enable-handle-auditing"; | 18 const char kAuditHandles[] = "enable-handle-auditing"; |
23 | 19 |
24 // The same as kAuditHandles except all handles are enumerated. | 20 // The same as kAuditHandles except all handles are enumerated. |
25 const char kAuditAllHandles[] = "enable-handle-auditing-all"; | 21 const char kAuditAllHandles[] = "enable-handle-auditing-all"; |
26 | 22 |
(...skipping 288 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
315 // That is temporary until we are sure low latency works and remove old code. | 311 // That is temporary until we are sure low latency works and remove old code. |
316 const char kHighLatencyAudio[] = "disable-low-latency-audio"; | 312 const char kHighLatencyAudio[] = "disable-low-latency-audio"; |
317 | 313 |
318 // Causes the process to run as a NativeClient broker | 314 // Causes the process to run as a NativeClient broker |
319 // (used for launching NaCl loader processes on 64-bit Windows). | 315 // (used for launching NaCl loader processes on 64-bit Windows). |
320 const char kNaClBrokerProcess[] = "nacl-broker"; | 316 const char kNaClBrokerProcess[] = "nacl-broker"; |
321 | 317 |
322 // Causes the process to run as a NativeClient loader. | 318 // Causes the process to run as a NativeClient loader. |
323 const char kNaClLoaderProcess[] = "nacl-loader"; | 319 const char kNaClLoaderProcess[] = "nacl-loader"; |
324 | 320 |
325 // By default, an https page can load images, fonts or frames from an http page. | |
326 // This switch overrides this to block this lesser mixed-content problem. | |
327 const char kNoDisplayingInsecureContent[] = "no-displaying-insecure-content"; | |
328 | |
329 // Support a separate switch that enables the v8 playback extension. | 321 // Support a separate switch that enables the v8 playback extension. |
330 // The extension causes javascript calls to Date.now() and Math.random() | 322 // The extension causes javascript calls to Date.now() and Math.random() |
331 // to return consistent values, such that subsequent loads of the same | 323 // to return consistent values, such that subsequent loads of the same |
332 // page will result in consistent js-generated data and XHR requests. | 324 // page will result in consistent js-generated data and XHR requests. |
333 // Pages may still be able to generate inconsistent data from plugins. | 325 // Pages may still be able to generate inconsistent data from plugins. |
334 const char kNoJsRandomness[] = "no-js-randomness"; | 326 const char kNoJsRandomness[] = "no-js-randomness"; |
335 | 327 |
336 // Don't send HTTP-Referer headers. | 328 // Don't send HTTP-Referer headers. |
337 const char kNoReferrers[] = "no-referrers"; | 329 const char kNoReferrers[] = "no-referrers"; |
338 | 330 |
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
501 // instead of NSS for SSL. | 493 // instead of NSS for SSL. |
502 const char kUseSystemSSL[] = "use-system-ssl"; | 494 const char kUseSystemSSL[] = "use-system-ssl"; |
503 #endif | 495 #endif |
504 | 496 |
505 #if !defined(OFFICIAL_BUILD) | 497 #if !defined(OFFICIAL_BUILD) |
506 // Causes the renderer process to throw an assertion on launch. | 498 // Causes the renderer process to throw an assertion on launch. |
507 const char kRendererCheckFalseTest[] = "renderer-check-false-test"; | 499 const char kRendererCheckFalseTest[] = "renderer-check-false-test"; |
508 #endif | 500 #endif |
509 | 501 |
510 } // namespace switches | 502 } // namespace switches |
OLD | NEW |