OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
6 | 6 |
7 namespace switches { | 7 namespace switches { |
8 | 8 |
9 // By default, file:// URIs cannot read other file:// URIs. This is an | 9 // By default, file:// URIs cannot read other file:// URIs. This is an |
10 // override for developers who need the old behavior for testing. | 10 // override for developers who need the old behavior for testing. |
11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
12 | 12 |
| 13 // Allows filters (SkImageFilter objects) to be sent between processes over IPC |
| 14 const char kAllowFiltersOverIPC[] = "allow-filters-over-ipc"; |
| 15 |
13 // Enables the sandboxed processes to run without a job object assigned to them. | 16 // Enables the sandboxed processes to run without a job object assigned to them. |
14 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This | 17 // This flag is required to allow Chrome to run in RemoteApps or Citrix. This |
15 // flag can reduce the security of the sandboxed processes and allow them to do | 18 // flag can reduce the security of the sandboxed processes and allow them to do |
16 // certain API calls like shut down Windows or access the clipboard. Also we | 19 // certain API calls like shut down Windows or access the clipboard. Also we |
17 // lose the chance to kill some processes until the outer job that owns them | 20 // lose the chance to kill some processes until the outer job that owns them |
18 // finishes. | 21 // finishes. |
19 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; | 22 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; |
20 | 23 |
21 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). | 24 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). |
22 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; | 25 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; |
(...skipping 907 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
930 const char kChildCleanExit[] = "child-clean-exit"; | 933 const char kChildCleanExit[] = "child-clean-exit"; |
931 #endif | 934 #endif |
932 | 935 |
933 #if defined(USE_AURA) | 936 #if defined(USE_AURA) |
934 // Forces usage of the test compositor. Needed to run ui tests on bots. | 937 // Forces usage of the test compositor. Needed to run ui tests on bots. |
935 extern const char kTestCompositor[] = "test-compositor"; | 938 extern const char kTestCompositor[] = "test-compositor"; |
936 #endif | 939 #endif |
937 | 940 |
938 // Don't dump stuff here, follow the same order as the header. | 941 // Don't dump stuff here, follow the same order as the header. |
939 | 942 |
940 // Allows filters (SkImageFilter objects) to be sent between processes over IPC | |
941 const char kAllowFiltersOverIPC[] = "allow-filters-over-ipc"; | |
942 | |
943 } // namespace switches | 943 } // namespace switches |
OLD | NEW |