| Index: Source/devtools/front_end/security/SecurityModel.js
|
| diff --git a/Source/devtools/front_end/security/SecurityModel.js b/Source/devtools/front_end/security/SecurityModel.js
|
| index cdd7dc2332578e4fbfb459f5deb44c373bda96eb..d0058571ee2c60a7bbfa0066d805e7ef4088d897 100644
|
| --- a/Source/devtools/front_end/security/SecurityModel.js
|
| +++ b/Source/devtools/front_end/security/SecurityModel.js
|
| @@ -60,10 +60,27 @@ WebInspector.SecurityDispatcher.prototype = {
|
| * @override
|
| * @param {!SecurityAgent.SecurityState} securityState
|
| * @param {!Array<!SecurityAgent.SecurityStateExplanation>=} explanations
|
| + * @param {!SecurityAgent.MixedContentStatus=} mixedContentStatus
|
| + * @param {boolean=} schemeIsCryptographic
|
| */
|
| - securityStateChanged: function(securityState, explanations)
|
| + securityStateChanged: function(securityState, explanations, mixedContentStatus, schemeIsCryptographic)
|
| {
|
| var data = {"securityState": securityState, "explanations": explanations || []};
|
| + if (schemeIsCryptographic && mixedContentStatus) {
|
| + if (mixedContentStatus.ranInsecureContent) {
|
| + explanations.push({
|
| + "securityState": mixedContentStatus.ranInsecureContentStyle,
|
| + "summary": WebInspector.UIString("Active Mixed Content"),
|
| + "description": WebInspector.UIString("You have recently allowed insecure content (such as scripts or iframes) to run on this site.")
|
| + });
|
| + } else if (mixedContentStatus.displayedInsecureContent) {
|
| + explanations.push({
|
| + "securityState": mixedContentStatus.displayedInsecureContentStyle,
|
| + "summary": WebInspector.UIString("Mixed Content"),
|
| + "description": WebInspector.UIString("The site includes HTTP resources.")
|
| + });
|
| + }
|
| + }
|
| this._model.dispatchEventToListeners(WebInspector.SecurityModel.EventTypes.SecurityStateChanged, data);
|
| }
|
| }
|
|
|