diff options
author | New Tobin Paradigm <email@mattatobin.com> | 2019-04-23 12:17:09 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-04-23 12:17:09 -0400 |
commit | 8bd7da130c720480a7bd6901ef3efbdac5f7258b (patch) | |
tree | 84fa1e0b2835f632b0eefc7965ff9506813f1f9a /mobile/android | |
parent | 7d61305b0f4415db66762ccc5ba758e2996dda63 (diff) | |
parent | b10712de8733ef8e8b963c0d020682d7a2590c3a (diff) | |
download | UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.gz UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.lz UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.xz UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.zip |
Merge pull request #1051 from adeshkp/remove-telemetry-security_ui
Remove SecurityUI telemetry.
Diffstat (limited to 'mobile/android')
-rw-r--r-- | mobile/android/chrome/content/browser.js | 28 |
1 files changed, 0 insertions, 28 deletions
diff --git a/mobile/android/chrome/content/browser.js b/mobile/android/chrome/content/browser.js index 93eb2addc..535f7e607 100644 --- a/mobile/android/chrome/content/browser.js +++ b/mobile/android/chrome/content/browser.js @@ -4704,46 +4704,18 @@ var ErrorPageEventHandler = { // The event came from a button on a malware/phishing block page // First check whether it's malware, phishing or unwanted, so that we // can use the right strings/links - let bucketName = ""; - let sendTelemetry = false; - if (errorDoc.documentURI.includes("e=malwareBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_MALWARE_PAGE_"; - } else if (errorDoc.documentURI.includes("e=deceptiveBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_PHISHING_PAGE_"; - } else if (errorDoc.documentURI.includes("e=unwantedBlocked")) { - sendTelemetry = true; - bucketName = "WARNING_UNWANTED_PAGE_"; - } - let nsISecTel = Ci.nsISecurityUITelemetry; let isIframe = (errorDoc.defaultView.parent === errorDoc.defaultView); - bucketName += isIframe ? "TOP_" : "FRAME_"; - let formatter = Cc["@mozilla.org/toolkit/URLFormatterService;1"].getService(Ci.nsIURLFormatter); if (target == errorDoc.getElementById("getMeOutButton")) { - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "GET_ME_OUT_OF_HERE"]); - } errorDoc.location = "about:home"; } else if (target == errorDoc.getElementById("reportButton")) { - // We log even if malware/phishing info URL couldn't be found: - // the measurement is for how many users clicked the WHY BLOCKED button - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "WHY_BLOCKED"]); - } - // This is the "Why is this site blocked" button. We redirect // to the generic page describing phishing/malware protection. let url = Services.urlFormatter.formatURLPref("app.support.baseURL"); BrowserApp.selectedBrowser.loadURI(url + "phishing-malware"); } else if (target == errorDoc.getElementById("ignoreWarningButton") && Services.prefs.getBoolPref("browser.safebrowsing.allowOverride")) { - if (sendTelemetry) { - Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "IGNORE_WARNING"]); - } - // Allow users to override and continue through to the site, let webNav = BrowserApp.selectedBrowser.docShell.QueryInterface(Ci.nsIWebNavigation); let location = BrowserApp.selectedBrowser.contentWindow.location; |