Index: media/base/media_switches.cc |
diff --git a/media/base/media_switches.cc b/media/base/media_switches.cc |
index b6de64a285451dbb1d39eb7584665a534616af51..cc4d92293c90885d02528d475fe133c8c851b306 100644 |
--- a/media/base/media_switches.cc |
+++ b/media/base/media_switches.cc |
@@ -67,6 +67,17 @@ const char kWaveOutBuffers[] = "waveout-buffers"; |
const char kUseCras[] = "use-cras"; |
#endif |
+// For automated testing of protected content, this switch allows specific |
+// domains (e.g. example.com) to allow the protected media identifier to be |
xhwang
2017/05/11 18:31:49
"allows to allow" sounds a bit odd
Vaage
2017/05/11 18:48:50
Done.
|
+// shared with out showing the user a permission prompt. This flag ignores the |
xhwang
2017/05/11 18:31:49
nit: s/with out/without
Vaage
2017/05/11 18:48:50
Done.
|
+// port number. This flag will have no effect if user-data-dir is not set. |
xhwang
2017/05/11 18:31:49
Please add a comment that this will not change use
Vaage
2017/05/11 18:48:50
Done.
|
+// Reference: http://crbug.com/718608 |
+// Example: |
+// --unsafely-allow-protected-media-identifier-for-domain=a.com,b.ca |
+// --user-data-dir=/test/only/profile/dir |
+const char kUnsafelyAllowProtectedMediaIdentifierForDomain[] = |
+ "unsafely-allow-protected-media-identifier-for-domain"; |
+ |
#if !defined(OS_ANDROID) || BUILDFLAG(ENABLE_PLUGINS) |
// Use a media session for each tabs in a way that two tabs can't play on top of |
// each other. This is different from the Media Session API as it is enabling a |