| Index: third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| index 8ca63c379259ce50d934dc8f3aab4b9e713cc8b5..102cdae04806e75b3a24458d7cd4414f6e3e6d25 100644
|
| --- a/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/inspector/security/mixed-content-reload.html
|
| @@ -8,22 +8,22 @@ function test()
|
| /** @type {!Protocol.Security.InsecureContentStatus} */
|
| var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: true, ranContentWithCertErrors: false, displayedContentWithCertErrors: false, ranInsecureContentStyle: Protocol.Security.SecurityState.Insecure, displayedInsecureContentStyle: Protocol.Security.SecurityState.Neutral };
|
|
|
| - InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(Protocol.Security.SecurityState.Neutral, [], insecureContentStatus, true));
|
| + InspectorTest.mainTarget.model(Security.SecurityModel).dispatchEventToListeners(Security.SecurityModel.Events.SecurityStateChanged, new Security.PageSecurityState(Protocol.Security.SecurityState.Neutral, [], insecureContentStatus, true));
|
|
|
| // At this point, the page has mixed content but no mixed requests have been recorded, so the user should be prompted to refresh.
|
| - var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| + var explanations = Security.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| for (var i = 0; i < explanations.length; i++)
|
| InspectorTest.dumpDeepInnerHTML(explanations[i]);
|
|
|
| // Now simulate a refresh.
|
|
|
| - InspectorTest.mainTarget.model(WebInspector.SecurityModel).dispatchEventToListeners(WebInspector.SecurityModel.Events.SecurityStateChanged, new WebInspector.PageSecurityState(Protocol.Security.SecurityState.Neutral, [], insecureContentStatus, true));
|
| + InspectorTest.mainTarget.model(Security.SecurityModel).dispatchEventToListeners(Security.SecurityModel.Events.SecurityStateChanged, new Security.PageSecurityState(Protocol.Security.SecurityState.Neutral, [], insecureContentStatus, true));
|
|
|
| - var request = new WebInspector.NetworkRequest(InspectorTest.mainTarget, 0, "http://foo.test", "https://foo.test", 0, 0, null);
|
| + var request = new SDK.NetworkRequest(InspectorTest.mainTarget, 0, "http://foo.test", "https://foo.test", 0, 0, null);
|
| request.mixedContentType = "optionally-blockable";
|
| InspectorTest.dispatchRequestFinished(request);
|
|
|
| - var explanations = WebInspector.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| + var explanations = Security.SecurityPanel._instance()._mainView.contentElement.getElementsByClassName("security-explanation");
|
| for (var i = 0; i < explanations.length; i++)
|
| InspectorTest.dumpDeepInnerHTML(explanations[i]);
|
| InspectorTest.completeTest();
|
|
|