| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
| 6 | 6 |
| 7 namespace switches { | 7 namespace switches { |
| 8 | 8 |
| 9 // The number of MSAA samples for canvas2D. Requires MSAA support by GPU to | 9 // The number of MSAA samples for canvas2D. Requires MSAA support by GPU to |
| 10 // have an effect. 0 disables MSAA. | 10 // have an effect. 0 disables MSAA. |
| 11 const char kAcceleratedCanvas2dMSAASampleCount[] = "canvas-msaa-sample-count"; | 11 const char kAcceleratedCanvas2dMSAASampleCount[] = "canvas-msaa-sample-count"; |
| 12 | 12 |
| 13 // By default, file:// URIs cannot read other file:// URIs. This is an | 13 // By default, file:// URIs cannot read other file:// URIs. This is an |
| 14 // override for developers who need the old behavior for testing. | 14 // override for developers who need the old behavior for testing. |
| 15 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 15 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
| 16 | 16 |
| 17 // Allows frames with an https origin to use WebSockets with an insecure URL | |
| 18 // (ws://). | |
| 19 const char kAllowInsecureWebSocketFromHttpsOrigin[] = | |
| 20 "allow-insecure-websocket-from-https-origin"; | |
| 21 | |
| 22 // Allows loopback interface to be added in network list for peer connection. | 17 // Allows loopback interface to be added in network list for peer connection. |
| 23 const char kAllowLoopbackInPeerConnection[] = | 18 const char kAllowLoopbackInPeerConnection[] = |
| 24 "allow-loopback-in-peer-connection"; | 19 "allow-loopback-in-peer-connection"; |
| 25 | 20 |
| 26 // Enables the sandboxed processes to run without a job object assigned to them. | 21 // Enables the sandboxed processes to run without a job object assigned to them. |
| 27 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This | 22 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This |
| 28 // flag can reduce the security of the sandboxed processes and allow them to do | 23 // flag can reduce the security of the sandboxed processes and allow them to do |
| 29 // certain API calls like shut down Windows or access the clipboard. Also we | 24 // certain API calls like shut down Windows or access the clipboard. Also we |
| 30 // lose the chance to kill some processes until the outer job that owns them | 25 // lose the chance to kill some processes until the outer job that owns them |
| 31 // finishes. | 26 // finishes. |
| (...skipping 952 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 984 const char kEnableNpapi[] = "enable-npapi"; | 979 const char kEnableNpapi[] = "enable-npapi"; |
| 985 | 980 |
| 986 #if defined(ENABLE_PLUGINS) | 981 #if defined(ENABLE_PLUGINS) |
| 987 // Enables the plugin power saver feature. | 982 // Enables the plugin power saver feature. |
| 988 const char kEnablePluginPowerSaver[] = "enable-plugin-power-saver"; | 983 const char kEnablePluginPowerSaver[] = "enable-plugin-power-saver"; |
| 989 #endif | 984 #endif |
| 990 | 985 |
| 991 // Don't dump stuff here, follow the same order as the header. | 986 // Don't dump stuff here, follow the same order as the header. |
| 992 | 987 |
| 993 } // namespace switches | 988 } // namespace switches |
| OLD | NEW |