diff options
author | adeshkp <adeshkp@users.noreply.github.com> | 2019-04-21 13:02:52 -0400 |
---|---|---|
committer | adeshkp <adeshkp@users.noreply.github.com> | 2019-04-21 13:02:52 -0400 |
commit | b10712de8733ef8e8b963c0d020682d7a2590c3a (patch) | |
tree | 2d492e0f05aaf234df1e79a5e84872bf9746d12a /mobile/android/chrome | |
parent | bccf86a10d845d2ea2d1dcd22383d09d3ddeba61 (diff) | |
download | UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.gz UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.lz UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.tar.xz UXP-b10712de8733ef8e8b963c0d020682d7a2590c3a.zip |
Remove SecurityUI telemetry.
Diffstat (limited to 'mobile/android/chrome')
-rw-r--r-- | mobile/android/chrome/content/browser.js | 28 |
1 files changed, 0 insertions, 28 deletions
diff --git a/mobile/android/chrome/content/browser.js b/mobile/android/chrome/content/browser.js index 93eb2addc..535f7e607 100644 --- a/mobile/android/chrome/content/browser.js +++ b/mobile/android/chrome/content/browser.js @@ -4704,46 +4704,18 @@ var ErrorPageEventHandler = { // The event came from a button on a malware/phishing block page // First check whether it's malware, phishing or unwanted, so that we // can use the right strings/links - let bucketName = ""; - let sendTelemetry = false; - if (errorDoc.documentURI.includes("e=malwareBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_MALWARE_PAGE_"; - } else if (errorDoc.documentURI.includes("e=deceptiveBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_PHISHING_PAGE_"; - } else if (errorDoc.documentURI.includes("e=unwantedBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_UNWANTED_PAGE_"; - } - let nsISecTel = Ci.nsISecurityUITelemetry; let isIframe = (errorDoc.defaultView.parent === errorDoc.defaultView); - bucketName += isIframe ? "TOP_" : "FRAME_"; - let formatter = Cc["@mozilla.org/toolkit/URLFormatterService;1"].getService(Ci.nsIURLFormatter); if (target == errorDoc.getElementById("getMeOutButton")) { - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "GET_ME_OUT_OF_HERE"]); - } errorDoc.location = "about:home"; } else if (target == errorDoc.getElementById("reportButton")) { - // We log even if malware/phishing info URL couldn't be found: - // the measurement is for how many users clicked the WHY BLOCKED button - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "WHY_BLOCKED"]); - } - // This is the "Why is this site blocked" button. We redirect // to the generic page describing phishing/malware protection. let url = Services.urlFormatter.formatURLPref("app.support.baseURL"); BrowserApp.selectedBrowser.loadURI(url + "phishing-malware"); } else if (target == errorDoc.getElementById("ignoreWarningButton") && Services.prefs.getBoolPref("browser.safebrowsing.allowOverride")) { - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "IGNORE_WARNING"]); - } - // Allow users to override and continue through to the site, let webNav = BrowserApp.selectedBrowser.docShell.QueryInterface(Ci.nsIWebNavigation); let location = BrowserApp.selectedBrowser.contentWindow.location; |