| OLD | NEW |
| 1 <html> | 1 <html> |
| 2 <head> | 2 <head> |
| 3 <script src="../inspector-test.js"></script> | 3 <script src="../inspector-test.js"></script> |
| 4 <script src="../security-test.js"></script> | 4 <script src="../security-test.js"></script> |
| 5 <script> | 5 <script> |
| 6 function test() | 6 function test() |
| 7 { | 7 { |
| 8 var mixedContentStatus = { ranInsecureContent: false, displayedInsecureConte
nt: false}; | 8 var mixedContentStatus = { ranInsecureContent: false, displayedInsecureConte
nt: false}; |
| 9 | 9 |
| 10 // Explanations from https://cbc.badssl.com/ as of 2016-06-13. | 10 // Explanations from https://cbc.badssl.com/ as of 2016-06-13. |
| 11 // We explicitly place the explanation with the security state "info" | 11 // We explicitly place the explanation with the security state "info" |
| 12 // first to make sure it gets reordered. | 12 // first to make sure it gets reordered. |
| 13 var explanations = [ | 13 var explanations = [ |
| 14 { | 14 { |
| 15 "description": "Public-key pinning was bypassed by a local root cert
ificate.", | 15 "description": "Public-key pinning was bypassed by a local root cert
ificate.", |
| 16 "securityState": "info", | 16 "securityState": "info", |
| 17 "summary": "Public-Key Pinning Bypassed" | 17 "summary": "Public-Key Pinning Bypassed" |
| 18 }, | 18 }, |
| 19 { | 19 { |
| 20 "certificateId": 1, | 20 "certificateId": 1, |
| 21 "description": "The connection to this site is using a valid, truste
d server certificate.", | 21 "description": "The connection to this site is using a valid, truste
d server certificate.", |
| 22 "securityState": "secure", | 22 "securityState": "secure", |
| 23 "summary": "Valid Certificate" | 23 "summary": "Valid Certificate" |
| 24 }, |
| 25 { |
| 26 "description": "The connection to this site uses a strong protocol (
TLS 1.2), a strong key exchange (ECDHE_RSA), and an obsolete cipher (AES_256_CBC
with HMAC-SHA1).", |
| 27 "securityState": "secure", |
| 28 "summary": "Obsolete Connection Settings" |
| 29 |
| 24 } | 30 } |
| 25 ]; | 31 ]; |
| 26 | 32 |
| 27 InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToLi
steners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector
.PageSecurityState(SecurityAgent.SecurityState.Secure, explanations, mixedConten
tStatus, true)); | 33 InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToLi
steners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector
.PageSecurityState(SecurityAgent.SecurityState.Secure, explanations, mixedConten
tStatus, true)); |
| 28 | 34 |
| 29 var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "
http://foo.test", "https://foo.test", 0, 0, null); | 35 var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "
http://foo.test", "https://foo.test", 0, 0, null); |
| 30 InspectorTest.dispatchRequestFinished(request); | 36 InspectorTest.dispatchRequestFinished(request); |
| 31 | 37 |
| 32 var explanations = WebInspector.SecurityPanel._instance()._mainView.contentE
lement.getElementsByClassName("security-explanation"); | 38 var explanations = WebInspector.SecurityPanel._instance()._mainView.contentE
lement.getElementsByClassName("security-explanation"); |
| 33 for (var i = 0; i < explanations.length; i++) | 39 for (var i = 0; i < explanations.length; i++) |
| 34 InspectorTest.dumpDeepInnerHTML(explanations[i]); | 40 InspectorTest.dumpDeepInnerHTML(explanations[i]); |
| 35 InspectorTest.completeTest(); | 41 InspectorTest.completeTest(); |
| 36 } | 42 } |
| 37 </script> | 43 </script> |
| 38 </head> | 44 </head> |
| 39 <body onload="runTest()"> | 45 <body onload="runTest()"> |
| 40 <p>Tests that info explanations are placed after regular explanations.</p> | 46 <p>Tests that info explanations are placed after regular explanations.</p> |
| 41 </body> | 47 </body> |
| 42 </html> | 48 </html> |
| OLD | NEW |