OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/public/common/content_switches.h" | 5 #include "content/public/common/content_switches.h" |
6 | 6 |
7 namespace switches { | 7 namespace switches { |
8 | 8 |
9 // By default, file:// URIs cannot read other file:// URIs. This is an | 9 // By default, file:// URIs cannot read other file:// URIs. This is an |
10 // override for developers who need the old behavior for testing. | 10 // override for developers who need the old behavior for testing. |
11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; | 11 const char kAllowFileAccessFromFiles[] = "allow-file-access-from-files"; |
12 | 12 |
| 13 // Explicitely grant the ability to access every other SecurityOrigin to |
| 14 // file URLs. This is a security havoc and should only be used for testing. |
| 15 const char kAllowUniversalAccessFromFiles[] = |
| 16 "allow-universal-access-from-files"; |
| 17 |
13 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). | 18 // Allows debugging of sandboxed processes (see zygote_main_linux.cc). |
14 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; | 19 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; |
15 | 20 |
16 // Allow compositing on chrome:// pages. | 21 // Allow compositing on chrome:// pages. |
17 const char kAllowWebUICompositing[] = "allow-webui-compositing"; | 22 const char kAllowWebUICompositing[] = "allow-webui-compositing"; |
18 | 23 |
19 // Enumerates and prints a child process' most dangerous handles when it | 24 // Enumerates and prints a child process' most dangerous handles when it |
20 // is terminated. | 25 // is terminated. |
21 const char kAuditHandles[] = "enable-handle-auditing"; | 26 const char kAuditHandles[] = "enable-handle-auditing"; |
22 | 27 |
(...skipping 714 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
737 // Sets the width and height above which a composited layer will get tiled. | 742 // Sets the width and height above which a composited layer will get tiled. |
738 const char kMaxUntiledLayerWidth[] = "max-untiled-layer-width"; | 743 const char kMaxUntiledLayerWidth[] = "max-untiled-layer-width"; |
739 const char kMaxUntiledLayerHeight[] = "max-untiled-layer-height"; | 744 const char kMaxUntiledLayerHeight[] = "max-untiled-layer-height"; |
740 | 745 |
741 const char kEnableFixedPositionCreatesStackingContext[] | 746 const char kEnableFixedPositionCreatesStackingContext[] |
742 = "enable-fixed-position-creates-stacking-context"; | 747 = "enable-fixed-position-creates-stacking-context"; |
743 const char kDisableFixedPositionCreatesStackingContext[] | 748 const char kDisableFixedPositionCreatesStackingContext[] |
744 = "disable-fixed-position-creates-stacking-context"; | 749 = "disable-fixed-position-creates-stacking-context"; |
745 | 750 |
746 } // namespace switches | 751 } // namespace switches |
OLD | NEW |