Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1028)

Side by Side Diff: third_party/WebKit/LayoutTests/http/tests/inspector/security/security-explanation-ordering.html

Issue 2851913002: [DevTools] Do not expose agents on Target
Patch Set: storage and tests.js Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 <html> 1 <html>
2 <head> 2 <head>
3 <script src="../inspector-test.js"></script> 3 <script src="../inspector-test.js"></script>
4 <script src="../security-test.js"></script> 4 <script src="../security-test.js"></script>
5 <script> 5 <script>
6 function test() 6 function test()
7 { 7 {
8 /** @type {!Protocol.Security.InsecureContentStatus} */ 8 /** @type {!Protocol.Security.InsecureContentStatus} */
9 var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: false, ranContentWithCertErrors: false, displayedContentWithCertErrors: false, ranInsecureContentStyle: Protocol.Security.SecurityState.Insecure, displayedInse cureContentStyle: Protocol.Security.SecurityState.Neutral }; 9 var insecureContentStatus = { ranMixedContent: false, displayedMixedContent: false, ranContentWithCertErrors: false, displayedContentWithCertErrors: false, ranInsecureContentStyle: Protocol.Security.SecurityState.Insecure, displayedInse cureContentStyle: Protocol.Security.SecurityState.Neutral };
10 10
(...skipping 15 matching lines...) Expand all
26 { 26 {
27 "description": "The connection to this site uses a strong protocol ( TLS 1.2), a strong key exchange (ECDHE_RSA), and an obsolete cipher (AES_256_CBC with HMAC-SHA1).", 27 "description": "The connection to this site uses a strong protocol ( TLS 1.2), a strong key exchange (ECDHE_RSA), and an obsolete cipher (AES_256_CBC with HMAC-SHA1).",
28 "securityState": "secure", 28 "securityState": "secure",
29 "summary": "Obsolete Connection Settings" 29 "summary": "Obsolete Connection Settings"
30 30
31 } 31 }
32 ]; 32 ];
33 33
34 InspectorTest.mainTarget.model(Security.SecurityModel).dispatchEventToListen ers(Security.SecurityModel.Events.SecurityStateChanged, new Security.PageSecurit yState(Protocol.Security.SecurityState.Secure, true, explanations, insecureConte ntStatus, null)); 34 InspectorTest.mainTarget.model(Security.SecurityModel).dispatchEventToListen ers(Security.SecurityModel.Events.SecurityStateChanged, new Security.PageSecurit yState(Protocol.Security.SecurityState.Secure, true, explanations, insecureConte ntStatus, null));
35 35
36 var request = new SDK.NetworkRequest(InspectorTest.mainTarget, 0, "http://fo o.test", "https://foo.test", 0, 0, null); 36 var request = new SDK.NetworkRequest(InspectorTest.networkManager, Inspector Test.NetworkAgent, 0, "http://foo.test", "https://foo.test", 0, 0, null);
37 InspectorTest.dispatchRequestFinished(request); 37 InspectorTest.dispatchRequestFinished(request);
38 38
39 var explanations = Security.SecurityPanel._instance()._mainView.contentEleme nt.getElementsByClassName("security-explanation"); 39 var explanations = Security.SecurityPanel._instance()._mainView.contentEleme nt.getElementsByClassName("security-explanation");
40 for (var i = 0; i < explanations.length; i++) 40 for (var i = 0; i < explanations.length; i++)
41 InspectorTest.dumpDeepInnerHTML(explanations[i]); 41 InspectorTest.dumpDeepInnerHTML(explanations[i]);
42 InspectorTest.completeTest(); 42 InspectorTest.completeTest();
43 } 43 }
44 </script> 44 </script>
45 </head> 45 </head>
46 <body onload="runTest()"> 46 <body onload="runTest()">
47 <p>Tests that info explanations are placed after regular explanations.</p> 47 <p>Tests that info explanations are placed after regular explanations.</p>
48 </body> 48 </body>
49 </html> 49 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698