| Index: content/public/common/content_switches.cc
|
| diff --git a/content/public/common/content_switches.cc b/content/public/common/content_switches.cc
|
| index 6d1f4a32610b68e601ebc24fdd1d0dd7a73fa6d5..66f35ab43ce5d42996d52bede8000525a544b973 100644
|
| --- a/content/public/common/content_switches.cc
|
| +++ b/content/public/common/content_switches.cc
|
| @@ -39,14 +39,6 @@ const char kAllowInsecureLocalhost[] = "allow-insecure-localhost";
|
| const char kAllowLoopbackInPeerConnection[] =
|
| "allow-loopback-in-peer-connection";
|
|
|
| -// Enables the sandboxed processes to run without a job object assigned to them.
|
| -// This flag is required to allow Chrome to run in RemoteApps or Citrix. This
|
| -// flag can reduce the security of the sandboxed processes and allow them to do
|
| -// certain API calls like shut down Windows or access the clipboard. Also we
|
| -// lose the chance to kill some processes until the outer job that owns them
|
| -// finishes.
|
| -const char kAllowNoSandboxJob[] = "allow-no-sandbox-job";
|
| -
|
| // Allows debugging of sandboxed processes (see zygote_main_linux.cc).
|
| const char kAllowSandboxDebugging[] = "allow-sandbox-debugging";
|
|
|
|
|