/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "nsISupports.idl" [scriptable, uuid(5d1acf82-223a-46fb-a8f3-a1b16e2ceb04)] interface nsISecurityUITelemetry : nsISupports { /* * Addon installation warnings */ // Firefox prevented this site from asking you to install addon const uint32_t WARNING_ADDON_ASKING_PREVENTED = 1; // User clicks through and allows site to ask to install addons const uint32_t WARNING_ADDON_ASKING_PREVENTED_CLICK_THROUGH = 2; // Are you sure you want to install this addon? Only install addons you trust const uint32_t WARNING_CONFIRM_ADDON_INSTALL = 3; // User clicked she is sure after waiting 3secs const uint32_t WARNING_CONFIRM_ADDON_INSTALL_CLICK_THROUGH = 4; /* * modal dialogs/warnings */ // removed WARNING_ENTERING_SECURE_SITE = 5; // removed WARNING_ENTERING_WEAK_SITE = 6; // removed WARNING_LEAVING_SECURE_SITE = 7; // removed WARNING_MIXED_CONTENT = 8; // For confirmation dialogs, the clickthrough constant needs to be 1 // more than the dialog constant so that // WARNING_CONFIRM_ + 1 == WARNING_CONFIRM__CLICK_THROUGH const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE = 9; const uint32_t WARNING_CONFIRM_POST_TO_INSECURE_FROM_SECURE_CLICK_THROUGH = 10; // removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE = 11; // removed WARNING_CONFIRM_POST_TO_INSECURE_FROM_INSECURE_CLICK_THROUGH = 12; /* * Phishing / Malware page warnings * deprecated: we use the _TOP and _FRAME versions below */ // removed WARNING_MALWARE_PAGE = 13; // removed WARNING_MALWARE_PAGE_WHY_BLOCKED = 14; // removed WARNING_MALWARE_PAGE_GET_ME_OUT_OF_HERE = 15; // removed WARNING_MALWARE_PAGE_IGNORE_WARNING = 16; // removed WARNING_PHISHING_PAGE = 17; // removed WARNING_PHISHING_PAGE_WHY_BLOCKED = 18; // removed WARNING_PHISHING_PAGE_GET_ME_OUT_OF_HERE = 19; // removed WARNING_PHISHING_PAGE_IGNORE_WARNING = 20; /* * SSL Error dialogs * deprecated: we use the _TOP versions below */ // removed WARNING_BAD_CERT = 21; // removed WARNING_BAD_CERT_STS = 22; // removed WARNING_BAD_CERT_CLICK_ADD_EXCEPTION = 23; // removed WARNING_BAD_CERT_CLICK_VIEW_CERT = 24; // removed WARNING_BAD_CERT_DONT_REMEMBER_EXCEPTION = 25; // removed WARNING_BAD_CERT_GET_ME_OUT_OF_HERE = 27; // removed WARNING_BAD_CERT_UNDERSTAND_RISKS = 28; // removed WARNING_BAD_CERT_TECHINICAL_DETAILS = 29; /* * Note that if we add more possibilities in the warning dialogs, * it is a new experiment and we shouldn't reuse these buckets. */ const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_BASE = 30; const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_DOMAIN = 2; const uint32_t WARNING_BAD_CERT_ADD_EXCEPTION_FLAG_TIME = 4; const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_BASE = 38; const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2; const uint32_t WARNING_BAD_CERT_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4; // This uses up buckets till 45 // const uint32_t WARNING_MALWARE_PAGE_TOP = 52; // const uint32_t WARNING_MALWARE_PAGE_TOP_WHY_BLOCKED = 53; // const uint32_t WARNING_MALWARE_PAGE_TOP_GET_ME_OUT_OF_HERE = 54; // const uint32_t WARNING_MALWARE_PAGE_TOP_IGNORE_WARNING = 55; // const uint32_t WARNING_PHISHING_PAGE_TOP = 56; // const uint32_t WARNING_PHISHING_PAGE_TOP_WHY_BLOCKED = 57; // const uint32_t WARNING_PHISHING_PAGE_TOP_GET_ME_OUT_OF_HERE = 58; // const uint32_t WARNING_PHISHING_PAGE_TOP_IGNORE_WARNING = 59; // const uint32_t WARNING_MALWARE_PAGE_FRAME = 60; // const uint32_t WARNING_MALWARE_PAGE_FRAME_WHY_BLOCKED = 61; // const uint32_t WARNING_MALWARE_PAGE_FRAME_GET_ME_OUT_OF_HERE = 62; // const uint32_t WARNING_MALWARE_PAGE_FRAME_IGNORE_WARNING = 63; // const uint32_t WARNING_PHISHING_PAGE_FRAME = 64; // const uint32_t WARNING_PHISHING_PAGE_FRAME_WHY_BLOCKED = 65; // const uint32_t WARNING_PHISHING_PAGE_FRAME_GET_ME_OUT_OF_HERE = 66; // const uint32_t WARNING_PHISHING_PAGE_FRAME_IGNORE_WARNING = 67; //const uint32_t WARNING_BAD_CERT_TOP = 68; //const uint32_t WARNING_BAD_CERT_TOP_STS = 69; //const uint32_t WARNING_BAD_CERT_TOP_CLICK_ADD_EXCEPTION = 70; const uint32_t WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT = 71; const uint32_t WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION = 72; //const uint32_t WARNING_BAD_CERT_TOP_GET_ME_OUT_OF_HERE = 73; //const uint32_t WARNING_BAD_CERT_TOP_UNDERSTAND_RISKS = 74; // removed WARNING_BAD_CERT_TOP_TECHNICAL_DETAILS = 75; const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE = 76; const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN = 2; const uint32_t WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME = 4; const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE = 84; const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED = 1; const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN = 2; const uint32_t WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME = 4; // Another Safe Browsing list (like malware & phishing above) // const uint32_t WARNING_UNWANTED_PAGE_TOP = 92; // const uint32_t WARNING_UNWANTED_PAGE_TOP_WHY_BLOCKED = 93; // const uint32_t WARNING_UNWANTED_PAGE_TOP_GET_ME_OUT_OF_HERE = 94; // const uint32_t WARNING_UNWANTED_PAGE_TOP_IGNORE_WARNING = 95; // const uint32_t WARNING_UNWANTED_PAGE_FRAME = 96; // const uint32_t WARNING_UNWANTED_PAGE_FRAME_WHY_BLOCKED = 97; // const uint32_t WARNING_UNWANTED_PAGE_FRAME_GET_ME_OUT_OF_HERE = 98; // const uint32_t WARNING_UNWANTED_PAGE_FRAME_IGNORE_WARNING = 99; // All the buckets are used so the safebrowsing-related buckets were // moved under PAGE_LOAD_ERROR probe. See bug 1636962 for more information. };