summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsISecurityUITelemetry.idl
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /security/manager/ssl/nsISecurityUITelemetry.idl
parentInitial commit. (diff)
downloadfirefox-2aa4a82499d4becd2284cdb482213d541b8804dd.tar.xz
firefox-2aa4a82499d4becd2284cdb482213d541b8804dd.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsISecurityUITelemetry.idl')
-rw-r--r--security/manager/ssl/nsISecurityUITelemetry.idl138
1 files changed, 138 insertions, 0 deletions
diff --git a/security/manager/ssl/nsISecurityUITelemetry.idl b/security/manager/ssl/nsISecurityUITelemetry.idl
new file mode 100644
index 0000000000..e29657c422
--- /dev/null
+++ b/security/manager/ssl/nsISecurityUITelemetry.idl
@@ -0,0 +1,138 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsISupports.idl"
+
+[scriptable, uuid(5d1acf82-223a-46fb-a8f3-a1b16e2ceb04)]
+interface nsISecurityUITelemetry : nsISupports {
+
+/*
+ * Addon installation warnings
+ */
+
+// Firefox prevented this site from asking you to install addon
+const uint32_t WARNING_ADDON_ASKING_PREVENTED = 1;
+// User clicks through and allows site to ask to install addons
+const uint32_t WARNING_ADDON_ASKING_PREVENTED_CLICK_THROUGH = 2;
+// Are you sure you want to install this addon? Only install addons you trust
+const uint32_t WARNING_CONFIRM_ADDON_INSTALL = 3;
+// User clicked she is sure after waiting 3secs
+const uint32_t WARNING_CONFIRM_ADDON_INSTALL_CLICK_THROUGH = 4;
+
+
+/*
+ * modal dialogs/warnings
+ */
+
+// removed WARNING_ENTERING_SECURE_SITE = 5;
+// removed WARNING_ENTERING_WEAK_SITE = 6;
+// removed WARNING_LEAVING_SECURE_SITE = 7;
+// removed WARNING_MIXED_CONTENT = 8;
+
+// For confirmation dialogs, the clickthrough constant needs to be 1
+// more than the dialog constant so that
+// WARNING_CONFIRM_<X> + 1 == WARNING_CONFIRM_<X>_CLICK_THROUGH
+const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE = 9;
+const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE_CLICK_THROUGH = 10;
+// removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE = 11;
+// removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE_CLICK_THROUGH = 12;
+
+/*
+ * Phishing / Malware page warnings
+ * deprecated: we use the _TOP and _FRAME versions below
+ */
+
+// removed WARNING_MALWARE_PAGE = 13;
+// removed WARNING_MALWARE_PAGE_WHY_BLOCKED = 14;
+// removed WARNING_MALWARE_PAGE_GET_ME_OUT_OF_HERE = 15;
+// removed WARNING_MALWARE_PAGE_IGNORE_WARNING = 16;
+
+// removed WARNING_PHISHING_PAGE = 17;
+// removed WARNING_PHISHING_PAGE_WHY_BLOCKED = 18;
+// removed WARNING_PHISHING_PAGE_GET_ME_OUT_OF_HERE = 19;
+// removed WARNING_PHISHING_PAGE_IGNORE_WARNING = 20;
+
+/*
+ * SSL Error dialogs
+ * deprecated: we use the _TOP versions below
+ */
+
+// removed WARNING_BAD_CERT = 21;
+// removed WARNING_BAD_CERT_STS = 22;
+// removed WARNING_BAD_CERT_CLICK_ADD_EXCEPTION = 23;
+// removed WARNING_BAD_CERT_CLICK_VIEW_CERT = 24;
+// removed WARNING_BAD_CERT_DONT_REMEMBER_EXCEPTION = 25;
+// removed WARNING_BAD_CERT_GET_ME_OUT_OF_HERE = 27;
+// removed WARNING_BAD_CERT_UNDERSTAND_RISKS = 28;
+// removed WARNING_BAD_CERT_TECHINICAL_DETAILS = 29;
+
+/*
+ * Note that if we add more possibilities in the warning dialogs,
+ * it is a new experiment and we shouldn't reuse these buckets.
+ */
+const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_BASE = 30;
+const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
+const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_DOMAIN = 2;
+const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_TIME = 4;
+
+const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_BASE = 38;
+const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
+const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
+const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
+// This uses up buckets till 45
+
+// const uint32_t WARNING_MALWARE_PAGE_TOP = 52;
+// const uint32_t WARNING_MALWARE_PAGE_TOP_WHY_BLOCKED = 53;
+// const uint32_t WARNING_MALWARE_PAGE_TOP_GET_ME_OUT_OF_HERE = 54;
+// const uint32_t WARNING_MALWARE_PAGE_TOP_IGNORE_WARNING = 55;
+
+// const uint32_t WARNING_PHISHING_PAGE_TOP = 56;
+// const uint32_t WARNING_PHISHING_PAGE_TOP_WHY_BLOCKED = 57;
+// const uint32_t WARNING_PHISHING_PAGE_TOP_GET_ME_OUT_OF_HERE = 58;
+// const uint32_t WARNING_PHISHING_PAGE_TOP_IGNORE_WARNING = 59;
+
+// const uint32_t WARNING_MALWARE_PAGE_FRAME = 60;
+// const uint32_t WARNING_MALWARE_PAGE_FRAME_WHY_BLOCKED = 61;
+// const uint32_t WARNING_MALWARE_PAGE_FRAME_GET_ME_OUT_OF_HERE = 62;
+// const uint32_t WARNING_MALWARE_PAGE_FRAME_IGNORE_WARNING = 63;
+
+// const uint32_t WARNING_PHISHING_PAGE_FRAME = 64;
+// const uint32_t WARNING_PHISHING_PAGE_FRAME_WHY_BLOCKED = 65;
+// const uint32_t WARNING_PHISHING_PAGE_FRAME_GET_ME_OUT_OF_HERE = 66;
+// const uint32_t WARNING_PHISHING_PAGE_FRAME_IGNORE_WARNING = 67;
+
+//const uint32_t WARNING_BAD_CERT_TOP = 68;
+//const uint32_t WARNING_BAD_CERT_TOP_STS = 69;
+//const uint32_t WARNING_BAD_CERT_TOP_CLICK_ADD_EXCEPTION = 70;
+const uint32_t WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT = 71;
+const uint32_t WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION = 72;
+//const uint32_t WARNING_BAD_CERT_TOP_GET_ME_OUT_OF_HERE = 73;
+//const uint32_t WARNING_BAD_CERT_TOP_UNDERSTAND_RISKS = 74;
+// removed WARNING_BAD_CERT_TOP_TECHNICAL_DETAILS = 75;
+
+const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE = 76;
+const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
+const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN = 2;
+const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME = 4;
+
+const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE = 84;
+const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1;
+const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2;
+const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4;
+
+// Another Safe Browsing list (like malware & phishing above)
+// const uint32_t WARNING_UNWANTED_PAGE_TOP = 92;
+// const uint32_t WARNING_UNWANTED_PAGE_TOP_WHY_BLOCKED = 93;
+// const uint32_t WARNING_UNWANTED_PAGE_TOP_GET_ME_OUT_OF_HERE = 94;
+// const uint32_t WARNING_UNWANTED_PAGE_TOP_IGNORE_WARNING = 95;
+// const uint32_t WARNING_UNWANTED_PAGE_FRAME = 96;
+// const uint32_t WARNING_UNWANTED_PAGE_FRAME_WHY_BLOCKED = 97;
+// const uint32_t WARNING_UNWANTED_PAGE_FRAME_GET_ME_OUT_OF_HERE = 98;
+// const uint32_t WARNING_UNWANTED_PAGE_FRAME_IGNORE_WARNING = 99;
+
+// All the buckets are used so the safebrowsing-related buckets were
+// moved under PAGE_LOAD_ERROR probe. See bug 1636962 for more information.
+};