summaryrefslogtreecommitdiffstats
path: root/mobile
diff options
context:
space:
mode:
authorNew Tobin Paradigm <email@mattatobin.com>2019-04-23 12:17:09 -0400
committerGitHub <noreply@github.com>2019-04-23 12:17:09 -0400
commit8bd7da130c720480a7bd6901ef3efbdac5f7258b (patch)
tree84fa1e0b2835f632b0eefc7965ff9506813f1f9a /mobile
parent7d61305b0f4415db66762ccc5ba758e2996dda63 (diff)
parentb10712de8733ef8e8b963c0d020682d7a2590c3a (diff)
downloadUXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar
UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.gz
UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.lz
UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.tar.xz
UXP-8bd7da130c720480a7bd6901ef3efbdac5f7258b.zip
Merge pull request #1051 from adeshkp/remove-telemetry-security_ui
Remove SecurityUI telemetry.
Diffstat (limited to 'mobile')
-rw-r--r--mobile/android/chrome/content/browser.js28
1 files changed, 0 insertions, 28 deletions
diff --git a/mobile/android/chrome/content/browser.js b/mobile/android/chrome/content/browser.js
index 93eb2addc..535f7e607 100644
--- a/mobile/android/chrome/content/browser.js
+++ b/mobile/android/chrome/content/browser.js
@@ -4704,46 +4704,18 @@ var ErrorPageEventHandler = {
// The event came from a button on a malware/phishing block page
// First check whether it's malware, phishing or unwanted, so that we
// can use the right strings/links
- let bucketName = "";
- let sendTelemetry = false;
- if (errorDoc.documentURI.includes("e=malwareBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_MALWARE_PAGE_";
- } else if (errorDoc.documentURI.includes("e=deceptiveBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_PHISHING_PAGE_";
- } else if (errorDoc.documentURI.includes("e=unwantedBlocked")) {
- sendTelemetry = true;
- bucketName = "WARNING_UNWANTED_PAGE_";
- }
- let nsISecTel = Ci.nsISecurityUITelemetry;
let isIframe = (errorDoc.defaultView.parent === errorDoc.defaultView);
- bucketName += isIframe ? "TOP_" : "FRAME_";
-
let formatter = Cc["@mozilla.org/toolkit/URLFormatterService;1"].getService(Ci.nsIURLFormatter);
if (target == errorDoc.getElementById("getMeOutButton")) {
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "GET_ME_OUT_OF_HERE"]);
- }
errorDoc.location = "about:home";
} else if (target == errorDoc.getElementById("reportButton")) {
- // We log even if malware/phishing info URL couldn't be found:
- // the measurement is for how many users clicked the WHY BLOCKED button
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "WHY_BLOCKED"]);
- }
-
// This is the "Why is this site blocked" button. We redirect
// to the generic page describing phishing/malware protection.
let url = Services.urlFormatter.formatURLPref("app.support.baseURL");
BrowserApp.selectedBrowser.loadURI(url + "phishing-malware");
} else if (target == errorDoc.getElementById("ignoreWarningButton") &&
Services.prefs.getBoolPref("browser.safebrowsing.allowOverride")) {
- if (sendTelemetry) {
- Telemetry.addData("SECURITY_UI", nsISecTel[bucketName + "IGNORE_WARNING"]);
- }
-
// Allow users to override and continue through to the site,
let webNav = BrowserApp.selectedBrowser.docShell.QueryInterface(Ci.nsIWebNavigation);
let location = BrowserApp.selectedBrowser.contentWindow.location;