security/manager/boot/public/nsISecurityUITelemetry.idl

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
michael@0 2 *
michael@0 3 * This Source Code Form is subject to the terms of the Mozilla Public
michael@0 4 * License, v. 2.0. If a copy of the MPL was not distributed with this
michael@0 5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
michael@0 6
michael@0 7 #include "nsISupports.idl"
michael@0 8
michael@0 9 [scriptable, uuid(f7259bf4-1f2b-4e9e-8983-1978cc076fa1)]
michael@0 10
michael@0 11 interface nsISecurityUITelemetry : nsISupports {
michael@0 12
michael@0 13 /*
michael@0 14 * Addon installation warnings
michael@0 15 */
michael@0 16
michael@0 17 // Firefox prevented this site from asking you to install addon
michael@0 18 const uint32_t WARNING_ADDON_ASKING_PREVENTED = 1;
michael@0 19 // User clicks through and allows site to ask to install addons
michael@0 20 const uint32_t WARNING_ADDON_ASKING_PREVENTED_CLICK_THROUGH = 2;
michael@0 21 // Are you sure you want to install this addon? Only install addons you trust
michael@0 22 const uint32_t WARNING_CONFIRM_ADDON_INSTALL = 3;
michael@0 23 // User clicked she is sure after waiting 3secs
michael@0 24 const uint32_t WARNING_CONFIRM_ADDON_INSTALL_CLICK_THROUGH = 4;
michael@0 25
michael@0 26
michael@0 27 /*
michael@0 28 * modal dialogs/warnings
michael@0 29 */
michael@0 30
michael@0 31 // removed WARNING_ENTERING_SECURE_SITE = 5;
michael@0 32 // removed WARNING_ENTERING_WEAK_SITE = 6;
michael@0 33 // removed WARNING_LEAVING_SECURE_SITE = 7;
michael@0 34 // removed WARNING_MIXED_CONTENT = 8;
michael@0 35
michael@0 36 // For confirmation dialogs, the clickthrough constant needs to be 1
michael@0 37 // more than the dialog constant so that
michael@0 38 // WARNING_CONFIRM_<X> + 1 == WARNING_CONFIRM_<X>_CLICK_THROUGH
michael@0 39 const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE = 9;
michael@0 40 const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE_CLICK_THROUGH = 10;
michael@0 41 // removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE = 11;
michael@0 42 // removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE_CLICK_THROUGH = 12;
michael@0 43
michael@0 44 /*
michael@0 45 * Phishing / Malware page warnings
michael@0 46 * deprecated: we use the _TOP and _FRAME versions below
michael@0 47 */
michael@0 48
michael@0 49 const uint32_t WARNING_MALWARE_PAGE = 13;
michael@0 50 const uint32_t WARNING_MALWARE_PAGE_WHY_BLOCKED = 14;
michael@0 51 const uint32_t WARNING_MALWARE_PAGE_GET_ME_OUT_OF_HERE = 15;
michael@0 52 const uint32_t WARNING_MALWARE_PAGE_IGNORE_WARNING = 16;
michael@0 53
michael@0 54 const uint32_t WARNING_PHISHING_PAGE = 17;
michael@0 55 const uint32_t WARNING_PHISHING_PAGE_WHY_BLOCKED = 18;
michael@0 56 const uint32_t WARNING_PHISHING_PAGE_GET_ME_OUT_OF_HERE = 19;
michael@0 57 const uint32_t WARNING_PHISHING_PAGE_IGNORE_WARNING = 20;
michael@0 58
michael@0 59 /*
michael@0 60 * SSL Error dialogs
michael@0 61 * deprecated: we use the _TOP versions below
michael@0 62 */
michael@0 63
michael@0 64 const uint32_t WARNING_BAD_CERT = 21;
michael@0 65 const uint32_t WARNING_BAD_CERT_STS = 22;
michael@0 66 const uint32_t WARNING_BAD_CERT_CLICK_ADD_EXCEPTION = 23;
michael@0 67 const uint32_t WARNING_BAD_CERT_CLICK_VIEW_CERT = 24;
michael@0 68 const uint32_t WARNING_BAD_CERT_DONT_REMEMBER_EXCEPTION = 25;
michael@0 69 const uint32_t WARNING_BAD_CERT_GET_ME_OUT_OF_HERE = 27;
michael@0 70 const uint32_t WARNING_BAD_CERT_UNDERSTAND_RISKS = 28;
michael@0 71 const uint32_t WARNING_BAD_CERT_TECHINICAL_DETAILS = 29;
michael@0 72
michael@0 73 /*
michael@0 74 * Note that if we add more possibilities in the warning dialogs,
michael@0 75 * it is a new experiment and we shouldn't reuse these buckets.
michael@0 76 */
michael@0 77 const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_BASE = 30;
michael@0 78 const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
michael@0 79 const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_DOMAIN = 2;
michael@0 80 const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_TIME = 4;
michael@0 81
michael@0 82 const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_BASE = 38;
michael@0 83 const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
michael@0 84 const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
michael@0 85 const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
michael@0 86 // This uses up buckets till 45
michael@0 87
michael@0 88 /*
michael@0 89 * Geolocation Popup Telemetry
michael@0 90 */
michael@0 91
michael@0 92 const uint32_t WARNING_GEOLOCATION_REQUEST = 46;
michael@0 93 const uint32_t WARNING_GEOLOCATION_REQUEST_SHARE_LOCATION = 47;
michael@0 94 const uint32_t WARNING_GEOLOCATION_REQUEST_ALWAYS_SHARE = 48;
michael@0 95 const uint32_t WARNING_GEOLOCATION_REQUEST_NEVER_SHARE = 49;
michael@0 96 // It would be nice to measure the two cases of user clicking
michael@0 97 // "not now", and user closing the popup. This is currently not implemented.
michael@0 98
michael@0 99 /*
michael@0 100 * Firefox Update Errors: UI is only thrown after
michael@0 101 * repeated errors. We only measure when the UI is shown.
michael@0 102 */
michael@0 103 const uint32_t WARNING_INSECURE_UPDATE = 50;
michael@0 104 const uint32_t WARNING_NO_SECURE_UPDATE = 51;
michael@0 105
michael@0 106 const uint32_t WARNING_MALWARE_PAGE_TOP = 52;
michael@0 107 const uint32_t WARNING_MALWARE_PAGE_TOP_WHY_BLOCKED = 53;
michael@0 108 const uint32_t WARNING_MALWARE_PAGE_TOP_GET_ME_OUT_OF_HERE = 54;
michael@0 109 const uint32_t WARNING_MALWARE_PAGE_TOP_IGNORE_WARNING = 55;
michael@0 110
michael@0 111 const uint32_t WARNING_PHISHING_PAGE_TOP = 56;
michael@0 112 const uint32_t WARNING_PHISHING_PAGE_TOP_WHY_BLOCKED = 57;
michael@0 113 const uint32_t WARNING_PHISHING_PAGE_TOP_GET_ME_OUT_OF_HERE = 58;
michael@0 114 const uint32_t WARNING_PHISHING_PAGE_TOP_IGNORE_WARNING = 59;
michael@0 115
michael@0 116 const uint32_t WARNING_MALWARE_PAGE_FRAME = 60;
michael@0 117 const uint32_t WARNING_MALWARE_PAGE_FRAME_WHY_BLOCKED = 61;
michael@0 118 const uint32_t WARNING_MALWARE_PAGE_FRAME_GET_ME_OUT_OF_HERE = 62;
michael@0 119 const uint32_t WARNING_MALWARE_PAGE_FRAME_IGNORE_WARNING = 63;
michael@0 120
michael@0 121 const uint32_t WARNING_PHISHING_PAGE_FRAME = 64;
michael@0 122 const uint32_t WARNING_PHISHING_PAGE_FRAME_WHY_BLOCKED = 65;
michael@0 123 const uint32_t WARNING_PHISHING_PAGE_FRAME_GET_ME_OUT_OF_HERE = 66;
michael@0 124 const uint32_t WARNING_PHISHING_PAGE_FRAME_IGNORE_WARNING = 67;
michael@0 125
michael@0 126 const uint32_t WARNING_BAD_CERT_TOP = 68;
michael@0 127 const uint32_t WARNING_BAD_CERT_TOP_STS = 69;
michael@0 128 const uint32_t WARNING_BAD_CERT_TOP_CLICK_ADD_EXCEPTION = 70;
michael@0 129 const uint32_t WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT = 71;
michael@0 130 const uint32_t WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION = 72;
michael@0 131 const uint32_t WARNING_BAD_CERT_TOP_GET_ME_OUT_OF_HERE = 73;
michael@0 132 const uint32_t WARNING_BAD_CERT_TOP_UNDERSTAND_RISKS = 74;
michael@0 133 const uint32_t WARNING_BAD_CERT_TOP_TECHNICAL_DETAILS = 75;
michael@0 134
michael@0 135 const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE = 76;
michael@0 136 const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
michael@0 137 const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN = 2;
michael@0 138 const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME = 4;
michael@0 139
michael@0 140 const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE = 84;
michael@0 141 const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
michael@0 142 const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
michael@0 143 const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
michael@0 144 // This uses up buckets till 91 (including)
michael@0 145 // We only have buckets up to 100.
michael@0 146 };

mercurial