Index: Source/devtools/front_end/security/SecurityModel.js |
diff --git a/Source/devtools/front_end/security/SecurityModel.js b/Source/devtools/front_end/security/SecurityModel.js |
index cdd7dc2332578e4fbfb459f5deb44c373bda96eb..d0058571ee2c60a7bbfa0066d805e7ef4088d897 100644 |
--- a/Source/devtools/front_end/security/SecurityModel.js |
+++ b/Source/devtools/front_end/security/SecurityModel.js |
@@ -60,10 +60,27 @@ WebInspector.SecurityDispatcher.prototype = { |
* @override |
* @param {!SecurityAgent.SecurityState} securityState |
* @param {!Array<!SecurityAgent.SecurityStateExplanation>=} explanations |
+ * @param {!SecurityAgent.MixedContentStatus=} mixedContentStatus |
+ * @param {boolean=} schemeIsCryptographic |
*/ |
- securityStateChanged: function(securityState, explanations) |
+ securityStateChanged: function(securityState, explanations, mixedContentStatus, schemeIsCryptographic) |
{ |
var data = {"securityState": securityState, "explanations": explanations || []}; |
+ if (schemeIsCryptographic && mixedContentStatus) { |
+ if (mixedContentStatus.ranInsecureContent) { |
+ explanations.push({ |
+ "securityState": mixedContentStatus.ranInsecureContentStyle, |
+ "summary": WebInspector.UIString("Active Mixed Content"), |
+ "description": WebInspector.UIString("You have recently allowed insecure content (such as scripts or iframes) to run on this site.") |
+ }); |
+ } else if (mixedContentStatus.displayedInsecureContent) { |
+ explanations.push({ |
+ "securityState": mixedContentStatus.displayedInsecureContentStyle, |
+ "summary": WebInspector.UIString("Mixed Content"), |
+ "description": WebInspector.UIString("The site includes HTTP resources.") |
+ }); |
+ } |
+ } |
this._model.dispatchEventToListeners(WebInspector.SecurityModel.EventTypes.SecurityStateChanged, data); |
} |
} |