security/manager/boot/public/nsISecurityUITelemetry.idl

changeset 0
6474c204b198
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/security/manager/boot/public/nsISecurityUITelemetry.idl	Wed Dec 31 06:09:35 2014 +0100
     1.3 @@ -0,0 +1,146 @@
     1.4 +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
     1.5 + *
     1.6 + * This Source Code Form is subject to the terms of the Mozilla Public
     1.7 + * License, v. 2.0. If a copy of the MPL was not distributed with this
     1.8 + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     1.9 +
    1.10 +#include "nsISupports.idl"
    1.11 +
    1.12 +[scriptable, uuid(f7259bf4-1f2b-4e9e-8983-1978cc076fa1)]
    1.13 +
    1.14 +interface nsISecurityUITelemetry : nsISupports {
    1.15 +
    1.16 +/*
    1.17 + * Addon installation warnings
    1.18 + */
    1.19 +
    1.20 +// Firefox prevented this site from asking you to install addon
    1.21 +const uint32_t WARNING_ADDON_ASKING_PREVENTED = 1;
    1.22 +// User clicks through and allows site to ask to install addons
    1.23 +const uint32_t WARNING_ADDON_ASKING_PREVENTED_CLICK_THROUGH = 2;
    1.24 +// Are you sure you want to install this addon? Only install addons you trust
    1.25 +const uint32_t WARNING_CONFIRM_ADDON_INSTALL = 3;
    1.26 +// User clicked she is sure after waiting 3secs
    1.27 +const uint32_t WARNING_CONFIRM_ADDON_INSTALL_CLICK_THROUGH  = 4;
    1.28 +
    1.29 +
    1.30 +/*
    1.31 + * modal dialogs/warnings 
    1.32 + */
    1.33 +
    1.34 +//     removed WARNING_ENTERING_SECURE_SITE = 5;
    1.35 +//     removed WARNING_ENTERING_WEAK_SITE = 6;
    1.36 +//     removed WARNING_LEAVING_SECURE_SITE = 7;
    1.37 +//     removed WARNING_MIXED_CONTENT  = 8;
    1.38 +
    1.39 +// For confirmation dialogs, the clickthrough constant needs to be 1
    1.40 +// more than the dialog constant so that
    1.41 +// WARNING_CONFIRM_<X> + 1 == WARNING_CONFIRM_<X>_CLICK_THROUGH
    1.42 +const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE = 9;
    1.43 +const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE_CLICK_THROUGH = 10;
    1.44 +//     removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE = 11;
    1.45 +//     removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE_CLICK_THROUGH = 12;
    1.46 +
    1.47 +/*
    1.48 + * Phishing / Malware page warnings
    1.49 + * deprecated: we use the _TOP and _FRAME versions below
    1.50 + */
    1.51 +
    1.52 +const uint32_t WARNING_MALWARE_PAGE = 13;
    1.53 +const uint32_t WARNING_MALWARE_PAGE_WHY_BLOCKED = 14;
    1.54 +const uint32_t WARNING_MALWARE_PAGE_GET_ME_OUT_OF_HERE = 15;
    1.55 +const uint32_t WARNING_MALWARE_PAGE_IGNORE_WARNING = 16;
    1.56 +
    1.57 +const uint32_t WARNING_PHISHING_PAGE = 17;
    1.58 +const uint32_t WARNING_PHISHING_PAGE_WHY_BLOCKED = 18;
    1.59 +const uint32_t WARNING_PHISHING_PAGE_GET_ME_OUT_OF_HERE = 19;
    1.60 +const uint32_t WARNING_PHISHING_PAGE_IGNORE_WARNING = 20;
    1.61 +
    1.62 +/* 
    1.63 + * SSL Error dialogs
    1.64 + * deprecated: we use the _TOP versions below
    1.65 + */
    1.66 +
    1.67 +const uint32_t WARNING_BAD_CERT = 21;
    1.68 +const uint32_t WARNING_BAD_CERT_STS = 22;
    1.69 +const uint32_t WARNING_BAD_CERT_CLICK_ADD_EXCEPTION = 23;
    1.70 +const uint32_t WARNING_BAD_CERT_CLICK_VIEW_CERT = 24;
    1.71 +const uint32_t WARNING_BAD_CERT_DONT_REMEMBER_EXCEPTION = 25;
    1.72 +const uint32_t WARNING_BAD_CERT_GET_ME_OUT_OF_HERE = 27;
    1.73 +const uint32_t WARNING_BAD_CERT_UNDERSTAND_RISKS = 28;
    1.74 +const uint32_t WARNING_BAD_CERT_TECHINICAL_DETAILS = 29;
    1.75 +
    1.76 +/*
    1.77 + * Note that if we add more possibilities in the warning dialogs,
    1.78 + * it is a new experiment and we shouldn't reuse these buckets.
    1.79 + */
    1.80 +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_BASE = 30;
    1.81 +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
    1.82 +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_DOMAIN = 2;
    1.83 +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_TIME = 4;
    1.84 +
    1.85 +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_BASE = 38;
    1.86 +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
    1.87 +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
    1.88 +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
    1.89 +// This uses up buckets till 45
    1.90 +
    1.91 +/*
    1.92 + * Geolocation Popup Telemetry
    1.93 + */
    1.94 +
    1.95 +const uint32_t WARNING_GEOLOCATION_REQUEST = 46;
    1.96 +const uint32_t WARNING_GEOLOCATION_REQUEST_SHARE_LOCATION = 47;
    1.97 +const uint32_t WARNING_GEOLOCATION_REQUEST_ALWAYS_SHARE = 48;
    1.98 +const uint32_t WARNING_GEOLOCATION_REQUEST_NEVER_SHARE = 49;
    1.99 +// It would be nice to measure the two cases of user clicking
   1.100 +// "not now", and user closing the popup. This is currently not implemented.
   1.101 +
   1.102 +/*
   1.103 + * Firefox Update Errors: UI is only thrown after 
   1.104 + * repeated errors. We only measure when the UI is shown.
   1.105 + */
   1.106 +const uint32_t WARNING_INSECURE_UPDATE = 50;
   1.107 +const uint32_t WARNING_NO_SECURE_UPDATE = 51;
   1.108 +
   1.109 +const uint32_t WARNING_MALWARE_PAGE_TOP = 52;
   1.110 +const uint32_t WARNING_MALWARE_PAGE_TOP_WHY_BLOCKED = 53;
   1.111 +const uint32_t WARNING_MALWARE_PAGE_TOP_GET_ME_OUT_OF_HERE = 54;
   1.112 +const uint32_t WARNING_MALWARE_PAGE_TOP_IGNORE_WARNING = 55;
   1.113 +
   1.114 +const uint32_t WARNING_PHISHING_PAGE_TOP = 56;
   1.115 +const uint32_t WARNING_PHISHING_PAGE_TOP_WHY_BLOCKED = 57;
   1.116 +const uint32_t WARNING_PHISHING_PAGE_TOP_GET_ME_OUT_OF_HERE = 58;
   1.117 +const uint32_t WARNING_PHISHING_PAGE_TOP_IGNORE_WARNING = 59;
   1.118 +
   1.119 +const uint32_t WARNING_MALWARE_PAGE_FRAME = 60;
   1.120 +const uint32_t WARNING_MALWARE_PAGE_FRAME_WHY_BLOCKED = 61;
   1.121 +const uint32_t WARNING_MALWARE_PAGE_FRAME_GET_ME_OUT_OF_HERE = 62;
   1.122 +const uint32_t WARNING_MALWARE_PAGE_FRAME_IGNORE_WARNING = 63;
   1.123 +
   1.124 +const uint32_t WARNING_PHISHING_PAGE_FRAME = 64;
   1.125 +const uint32_t WARNING_PHISHING_PAGE_FRAME_WHY_BLOCKED = 65;
   1.126 +const uint32_t WARNING_PHISHING_PAGE_FRAME_GET_ME_OUT_OF_HERE = 66;
   1.127 +const uint32_t WARNING_PHISHING_PAGE_FRAME_IGNORE_WARNING = 67;
   1.128 +
   1.129 +const uint32_t WARNING_BAD_CERT_TOP = 68;
   1.130 +const uint32_t WARNING_BAD_CERT_TOP_STS = 69;
   1.131 +const uint32_t WARNING_BAD_CERT_TOP_CLICK_ADD_EXCEPTION = 70;
   1.132 +const uint32_t WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT = 71;
   1.133 +const uint32_t WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION = 72;
   1.134 +const uint32_t WARNING_BAD_CERT_TOP_GET_ME_OUT_OF_HERE = 73;
   1.135 +const uint32_t WARNING_BAD_CERT_TOP_UNDERSTAND_RISKS = 74;
   1.136 +const uint32_t WARNING_BAD_CERT_TOP_TECHNICAL_DETAILS = 75;
   1.137 +
   1.138 +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE = 76;
   1.139 +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
   1.140 +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN = 2;
   1.141 +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME = 4;
   1.142 +
   1.143 +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE = 84;
   1.144 +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
   1.145 +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
   1.146 +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
   1.147 +// This uses up buckets till 91 (including)
   1.148 +// We only have buckets up to 100.
   1.149 +};

mercurial