| Index: third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
 | 
| diff --git a/third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
 | 
| similarity index 52%
 | 
| copy from third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html
 | 
| copy to third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
 | 
| index 99c3a597707a271be980582d6a7bb871ce80f269..6720bf2a673f6d0fbedcfd9c6c9a83b2f7272d72 100644
 | 
| --- a/third_party/WebKit/LayoutTests/http/tests/inspector/security/active-subresource-with-cert-errors.html
 | 
| +++ b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
 | 
| @@ -6,11 +6,21 @@
 | 
|  function test()
 | 
|  {
 | 
|      /** @type {!SecurityAgent.InsecureContentStatus} */
 | 
| -    var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: false, ranContentWithCertErrors: true, displayedContentWithCertErrors: false, ranInsecureContentStyle: SecurityAgent.SecurityState.Insecure, displayedInsecureContentStyle: SecurityAgent.SecurityState.Neutral };
 | 
| +    var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: true, ranContentWithCertErrors: false, displayedContentWithCertErrors: false, ranInsecureContentStyle: SecurityAgent.SecurityState.Insecure, displayedInsecureContentStyle: SecurityAgent.SecurityState.Neutral };
 | 
|  
 | 
| -    InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Insecure, [], insecureContentStatus, true));
 | 
| +    InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Neutral, [], insecureContentStatus, true));
 | 
| +
 | 
| +    // At this point, the page has mixed content but no mixed requests have been recorded, so the user should be prompted to refresh.
 | 
| +    var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
 | 
| +    for (var i = 0; i < explanations.length; i++)
 | 
| +        InspectorTest.dumpDeepInnerHTML(explanations[i]);
 | 
| +
 | 
| +    // Now simulate a refresh.
 | 
| +
 | 
| +    InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(SecurityAgent.SecurityState.Neutral, [], insecureContentStatus, true));
 | 
|  
 | 
|      var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "http://foo.test", "https://foo.test", 0, 0, null);
 | 
| +    request.mixedContentType = "optionally-blockable";
 | 
|      InspectorTest.dispatchRequestFinished(request);
 | 
|  
 | 
|      var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
 | 
| @@ -21,6 +31,6 @@ function test()
 | 
|  </script>
 | 
|  </head>
 | 
|  <body onload="runTest()">
 | 
| -<p>Tests addition of explanation when an active subresource was loaded with certificate errors.</p>
 | 
| +<p>Tests that the mixed content explanation prompts the user to refresh when there are no recorded requests, and links to the network panel when there are recorded requests.</p>
 | 
|  </body>
 | 
|  </html>
 | 
| 
 |