Chromium Code Reviews| Index: media/base/media_switches.cc |
| diff --git a/media/base/media_switches.cc b/media/base/media_switches.cc |
| index b6de64a285451dbb1d39eb7584665a534616af51..cc4d92293c90885d02528d475fe133c8c851b306 100644 |
| --- a/media/base/media_switches.cc |
| +++ b/media/base/media_switches.cc |
| @@ -67,6 +67,17 @@ const char kWaveOutBuffers[] = "waveout-buffers"; |
| const char kUseCras[] = "use-cras"; |
| #endif |
| +// For automated testing of protected content, this switch allows specific |
| +// domains (e.g. example.com) to allow the protected media identifier to be |
|
xhwang
2017/05/11 18:31:49
"allows to allow" sounds a bit odd
Vaage
2017/05/11 18:48:50
Done.
|
| +// shared with out showing the user a permission prompt. This flag ignores the |
|
xhwang
2017/05/11 18:31:49
nit: s/with out/without
Vaage
2017/05/11 18:48:50
Done.
|
| +// port number. This flag will have no effect if user-data-dir is not set. |
|
xhwang
2017/05/11 18:31:49
Please add a comment that this will not change use
Vaage
2017/05/11 18:48:50
Done.
|
| +// Reference: http://crbug.com/718608 |
| +// Example: |
| +// --unsafely-allow-protected-media-identifier-for-domain=a.com,b.ca |
| +// --user-data-dir=/test/only/profile/dir |
| +const char kUnsafelyAllowProtectedMediaIdentifierForDomain[] = |
| + "unsafely-allow-protected-media-identifier-for-domain"; |
| + |
| #if !defined(OS_ANDROID) || BUILDFLAG(ENABLE_PLUGINS) |
| // Use a media session for each tabs in a way that two tabs can't play on top of |
| // each other. This is different from the Media Session API as it is enabling a |