summaryrefslogtreecommitdiffstats
path: root/mobile/android/chrome/content
diff options
context:
space:
mode:
authoradeshkp <adeshkp@users.noreply.github.com>2019-04-21 13:02:52 -0400
committeradeshkp <adeshkp@users.noreply.github.com>2019-04-21 13:02:52 -0400
commitb10712de8733ef8e8b963c0d020682d7a2590c3a (patch)
tree2d492e0f05aaf234df1e79a5e84872bf9746d12a /mobile/android/chrome/content
parentbccf86a10d845d2ea2d1dcd22383d09d3ddeba61 (diff)
downloadUXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar
UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.gz
UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.lz
UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.xz
UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.zip
Remove SecurityUI telemetry.
Diffstat (limited to 'mobile/android/chrome/content')
-rw-r--r--mobile/android/chrome/content/browser.js28
1 files changed, 0 insertions, 28 deletions
diff --git a/mobile/android/chrome/content/browser.js b/mobile/android/chrome/content/browser.js
index 93eb2addc..535f7e607 100644
--- a/mobile/android/chrome/content/browser.js
+++ b/mobile/android/chrome/content/browser.js
@@ -4704,46 +4704,18 @@ var ErrorPageEventHandler = {
// The event came from a button on a malware/phishing block page
// First check whether it's malware, phishing or unwanted, so that we
// can use the right strings/links
- let bucketName = "";
- let sendTelemetry = false;
- if (errorDoc.documentURI.includes("e=malwareBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_MALWARE_PAGE_";
- } else if (errorDoc.documentURI.includes("e=deceptiveBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_PHISHING_PAGE_";
- } else if (errorDoc.documentURI.includes("e=unwantedBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_UNWANTED_PAGE_";
- }
- let nsISecTel = Ci.nsISecurityUITelemetry;
let isIframe = (errorDoc.defaultView.parent === errorDoc.defaultView);
- bucketName += isIframe ? "TOP_" : "FRAME_";
-
let formatter = Cc["@mozilla.org/toolkit/URLFormatterService;1"].getService(Ci.nsIURLFormatter);
if (target == errorDoc.getElementById("getMeOutButton")) {
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "GET_ME_OUT_OF_HERE"]);
- }
errorDoc.location = "about:home";
} else if (target == errorDoc.getElementById("reportButton")) {
- // We log even if malware/phishing info URL couldn't be found:
- // the measurement is for how many users clicked the WHY BLOCKED button
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "WHY_BLOCKED"]);
- }
-
// This is the "Why is this site blocked" button. We redirect
// to the generic page describing phishing/malware protection.
let url = Services.urlFormatter.formatURLPref("app.support.baseURL");
BrowserApp.selectedBrowser.loadURI(url + "phishing-malware");
} else if (target == errorDoc.getElementById("ignoreWarningButton") &&
Services.prefs.getBoolPref("browser.safebrowsing.allowOverride")) {
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "IGNORE_WARNING"]);
- }
-
// Allow users to override and continue through to the site,
let webNav = BrowserApp.selectedBrowser.docShell.QueryInterface(Ci.nsIWebNavigation);
let location = BrowserApp.selectedBrowser.contentWindow.location;