diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
commit | 2aa4a82499d4becd2284cdb482213d541b8804dd (patch) | |
tree | b80bf8bf13c3766139fbacc530efd0dd9d54394c /security/manager/ssl/nsISecurityUITelemetry.idl | |
parent | Initial commit. (diff) | |
download | firefox-2aa4a82499d4becd2284cdb482213d541b8804dd.tar.xz firefox-2aa4a82499d4becd2284cdb482213d541b8804dd.zip |
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsISecurityUITelemetry.idl')
-rw-r--r-- | security/manager/ssl/nsISecurityUITelemetry.idl | 138 |
1 files changed, 138 insertions, 0 deletions
diff --git a/security/manager/ssl/nsISecurityUITelemetry.idl b/security/manager/ssl/nsISecurityUITelemetry.idl new file mode 100644 index 0000000000..e29657c422 --- /dev/null +++ b/security/manager/ssl/nsISecurityUITelemetry.idl @@ -0,0 +1,138 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- + * + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsISupports.idl" + +[scriptable, uuid(5d1acf82-223a-46fb-a8f3-a1b16e2ceb04)] +interface nsISecurityUITelemetry : nsISupports { + +/* + * Addon installation warnings + */ + +// Firefox prevented this site from asking you to install addon +const uint32_t WARNING_ADDON_ASKING_PREVENTED = 1; +// User clicks through and allows site to ask to install addons +const uint32_t WARNING_ADDON_ASKING_PREVENTED_CLICK_THROUGH = 2; +// Are you sure you want to install this addon? Only install addons you trust +const uint32_t WARNING_CONFIRM_ADDON_INSTALL = 3; +// User clicked she is sure after waiting 3secs +const uint32_t WARNING_CONFIRM_ADDON_INSTALL_CLICK_THROUGH = 4; + + +/* + * modal dialogs/warnings + */ + +// removed WARNING_ENTERING_SECURE_SITE = 5; +// removed WARNING_ENTERING_WEAK_SITE = 6; +// removed WARNING_LEAVING_SECURE_SITE = 7; +// removed WARNING_MIXED_CONTENT = 8; + +// For confirmation dialogs, the clickthrough constant needs to be 1 +// more than the dialog constant so that +// WARNING_CONFIRM_<X> + 1 == WARNING_CONFIRM_<X>_CLICK_THROUGH +const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE = 9; +const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE_CLICK_THROUGH = 10; +// removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE = 11; +// removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE_CLICK_THROUGH = 12; + +/* + * Phishing / Malware page warnings + * deprecated: we use the _TOP and _FRAME versions below + */ + +// removed WARNING_MALWARE_PAGE = 13; +// removed WARNING_MALWARE_PAGE_WHY_BLOCKED = 14; +// removed WARNING_MALWARE_PAGE_GET_ME_OUT_OF_HERE = 15; +// removed WARNING_MALWARE_PAGE_IGNORE_WARNING = 16; + +// removed WARNING_PHISHING_PAGE = 17; +// removed WARNING_PHISHING_PAGE_WHY_BLOCKED = 18; +// removed WARNING_PHISHING_PAGE_GET_ME_OUT_OF_HERE = 19; +// removed WARNING_PHISHING_PAGE_IGNORE_WARNING = 20; + +/* + * SSL Error dialogs + * deprecated: we use the _TOP versions below + */ + +// removed WARNING_BAD_CERT = 21; +// removed WARNING_BAD_CERT_STS = 22; +// removed WARNING_BAD_CERT_CLICK_ADD_EXCEPTION = 23; +// removed WARNING_BAD_CERT_CLICK_VIEW_CERT = 24; +// removed WARNING_BAD_CERT_DONT_REMEMBER_EXCEPTION = 25; +// removed WARNING_BAD_CERT_GET_ME_OUT_OF_HERE = 27; +// removed WARNING_BAD_CERT_UNDERSTAND_RISKS = 28; +// removed WARNING_BAD_CERT_TECHINICAL_DETAILS = 29; + +/* + * Note that if we add more possibilities in the warning dialogs, + * it is a new experiment and we shouldn't reuse these buckets. + */ +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_BASE = 30; +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_DOMAIN = 2; +const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_TIME = 4; + +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_BASE = 38; +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2; +const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4; +// This uses up buckets till 45 + +// const uint32_t WARNING_MALWARE_PAGE_TOP = 52; +// const uint32_t WARNING_MALWARE_PAGE_TOP_WHY_BLOCKED = 53; +// const uint32_t WARNING_MALWARE_PAGE_TOP_GET_ME_OUT_OF_HERE = 54; +// const uint32_t WARNING_MALWARE_PAGE_TOP_IGNORE_WARNING = 55; + +// const uint32_t WARNING_PHISHING_PAGE_TOP = 56; +// const uint32_t WARNING_PHISHING_PAGE_TOP_WHY_BLOCKED = 57; +// const uint32_t WARNING_PHISHING_PAGE_TOP_GET_ME_OUT_OF_HERE = 58; +// const uint32_t WARNING_PHISHING_PAGE_TOP_IGNORE_WARNING = 59; + +// const uint32_t WARNING_MALWARE_PAGE_FRAME = 60; +// const uint32_t WARNING_MALWARE_PAGE_FRAME_WHY_BLOCKED = 61; +// const uint32_t WARNING_MALWARE_PAGE_FRAME_GET_ME_OUT_OF_HERE = 62; +// const uint32_t WARNING_MALWARE_PAGE_FRAME_IGNORE_WARNING = 63; + +// const uint32_t WARNING_PHISHING_PAGE_FRAME = 64; +// const uint32_t WARNING_PHISHING_PAGE_FRAME_WHY_BLOCKED = 65; +// const uint32_t WARNING_PHISHING_PAGE_FRAME_GET_ME_OUT_OF_HERE = 66; +// const uint32_t WARNING_PHISHING_PAGE_FRAME_IGNORE_WARNING = 67; + +//const uint32_t WARNING_BAD_CERT_TOP = 68; +//const uint32_t WARNING_BAD_CERT_TOP_STS = 69; +//const uint32_t WARNING_BAD_CERT_TOP_CLICK_ADD_EXCEPTION = 70; +const uint32_t WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT = 71; +const uint32_t WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION = 72; +//const uint32_t WARNING_BAD_CERT_TOP_GET_ME_OUT_OF_HERE = 73; +//const uint32_t WARNING_BAD_CERT_TOP_UNDERSTAND_RISKS = 74; +// removed WARNING_BAD_CERT_TOP_TECHNICAL_DETAILS = 75; + +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE = 76; +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN = 2; +const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME = 4; + +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE = 84; +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2; +const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4; + +// Another Safe Browsing list (like malware & phishing above) +// const uint32_t WARNING_UNWANTED_PAGE_TOP = 92; +// const uint32_t WARNING_UNWANTED_PAGE_TOP_WHY_BLOCKED = 93; +// const uint32_t WARNING_UNWANTED_PAGE_TOP_GET_ME_OUT_OF_HERE = 94; +// const uint32_t WARNING_UNWANTED_PAGE_TOP_IGNORE_WARNING = 95; +// const uint32_t WARNING_UNWANTED_PAGE_FRAME = 96; +// const uint32_t WARNING_UNWANTED_PAGE_FRAME_WHY_BLOCKED = 97; +// const uint32_t WARNING_UNWANTED_PAGE_FRAME_GET_ME_OUT_OF_HERE = 98; +// const uint32_t WARNING_UNWANTED_PAGE_FRAME_IGNORE_WARNING = 99; + +// All the buckets are used so the safebrowsing-related buckets were +// moved under PAGE_LOAD_ERROR probe. See bug 1636962 for more information. +}; |