OLD | NEW |
1 <html> | 1 <html> |
2 <head> | 2 <head> |
3 <script src="../inspector-test.js"></script> | 3 <script src="../inspector-test.js"></script> |
4 <script src="../security-test.js"></script> | 4 <script src="../security-test.js"></script> |
5 <script> | 5 <script> |
6 function test() | 6 function test() |
7 { | 7 { |
8 var mixedContentStatus = { ranInsecureContent: false, displayedInsecureConte
nt: false}; | 8 var mixedContentStatus = { ranInsecureContent: false, displayedInsecureConte
nt: false}; |
9 | 9 |
10 // Explanations from https://cbc.badssl.com/ as of 2016-06-13. | 10 // Explanations from https://cbc.badssl.com/ as of 2016-06-13. |
11 // We explicitly place the explanation with the security state "info" | 11 // We explicitly place the explanation with the security state "info" |
12 // first to make sure it gets reordered. | 12 // first to make sure it gets reordered. |
13 var explanations = [ | 13 var explanations = [ |
14 { | 14 { |
15 "description": "Public-key pinning was bypassed by a local root cert
ificate.", | 15 "description": "Public-key pinning was bypassed by a local root cert
ificate.", |
16 "securityState": "info", | 16 "securityState": "info", |
17 "summary": "Public-Key Pinning Bypassed" | 17 "summary": "Public-Key Pinning Bypassed" |
18 }, | 18 }, |
19 { | 19 { |
20 "certificateId": 1, | 20 "certificateId": 1, |
21 "description": "The connection to this site is using a valid, truste
d server certificate.", | 21 "description": "The connection to this site is using a valid, truste
d server certificate.", |
22 "securityState": "secure", | 22 "securityState": "secure", |
23 "summary": "Valid Certificate" | 23 "summary": "Valid Certificate" |
| 24 }, |
| 25 { |
| 26 "description": "The connection to this site uses a strong protocol (
TLS 1.2), a strong key exchange (ECDHE_RSA), and an obsolete cipher (AES_256_CBC
with HMAC-SHA1).", |
| 27 "securityState": "secure", |
| 28 "summary": "Obsolete Connection Settings" |
| 29 |
24 } | 30 } |
25 ]; | 31 ]; |
26 | 32 |
27 InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToLi
steners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector
.PageSecurityState(SecurityAgent.SecurityState.Secure, explanations, mixedConten
tStatus, true)); | 33 InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToLi
steners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector
.PageSecurityState(SecurityAgent.SecurityState.Secure, explanations, mixedConten
tStatus, true)); |
28 | 34 |
29 var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "
http://foo.test", "https://foo.test", 0, 0, null); | 35 var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "
http://foo.test", "https://foo.test", 0, 0, null); |
30 InspectorTest.dispatchRequestFinished(request); | 36 InspectorTest.dispatchRequestFinished(request); |
31 | 37 |
32 var explanations = WebInspector.SecurityPanel._instance()._mainView.contentE
lement.getElementsByClassName("security-explanation"); | 38 var explanations = WebInspector.SecurityPanel._instance()._mainView.contentE
lement.getElementsByClassName("security-explanation"); |
33 for (var i = 0; i < explanations.length; i++) | 39 for (var i = 0; i < explanations.length; i++) |
34 InspectorTest.dumpDeepInnerHTML(explanations[i]); | 40 InspectorTest.dumpDeepInnerHTML(explanations[i]); |
35 InspectorTest.completeTest(); | 41 InspectorTest.completeTest(); |
36 } | 42 } |
37 </script> | 43 </script> |
38 </head> | 44 </head> |
39 <body onload="runTest()"> | 45 <body onload="runTest()"> |
40 <p>Tests that info explanations are placed after regular explanations.</p> | 46 <p>Tests that info explanations are placed after regular explanations.</p> |
41 </body> | 47 </body> |
42 </html> | 48 </html> |
OLD | NEW |