| Index: third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| similarity index 52%
|
| copy from third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html
|
| copy to third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| index 99c3a597707a271be980582d6a7bb871ce80f269..6720bf2a673f6d0fbedcfd9c6c9a83b2f7272d72 100644
|
| --- a/third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| @@ -6,11 +6,21 @@
|
| function test()
|
| {
|
| /** @type {!SecurityAgent.InsecureContentStatus} */
|
| - var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: false, ranContentWithCertErrors: true, displayedContentWithCertErrors: false, ranInsecureContentStyle: SecurityAgent.SecurityState.Insecure, displayedInsecureContentStyle: SecurityAgent.SecurityState.Neutral };
|
| + var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: true, ranContentWithCertErrors: false, displayedContentWithCertErrors: false, ranInsecureContentStyle: SecurityAgent.SecurityState.Insecure, displayedInsecureContentStyle: SecurityAgent.SecurityState.Neutral };
|
|
|
| - InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Insecure, [], insecureContentStatus, true));
|
| + InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Neutral, [], insecureContentStatus, true));
|
| +
|
| + // At this point, the page has mixed content but no mixed requests have been recorded, so the user should be prompted to refresh.
|
| + var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| + for (var i = 0; i < explanations.length; i++)
|
| + InspectorTest.dumpDeepInnerHTML(explanations[i]);
|
| +
|
| + // Now simulate a refresh.
|
| +
|
| + InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Neutral, [], insecureContentStatus, true));
|
|
|
| var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "http://foo.test", "https://foo.test", 0, 0, null);
|
| + request.mixedContentType = "optionally-blockable";
|
| InspectorTest.dispatchRequestFinished(request);
|
|
|
| var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| @@ -21,6 +31,6 @@ function test()
|
| </script>
|
| </head>
|
| <body onload="runTest()">
|
| -<p>Tests addition of explanation when an active subresource was loaded with certificate errors.</p>
|
| +<p>Tests that the mixed content explanation prompts the user to refresh when there are no recorded requests, and links to the network panel when there are recorded requests.</p>
|
| </body>
|
| </html>
|
|
|