Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(68)

Side by Side Diff: chrome/browser/content_settings/permission_context_uma_util.cc

Issue 1164073005: Allow script to request durable storage permission (chrome side) (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebased onto content setting patch Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/metrics/histogram_macros.h" 5 #include "base/metrics/histogram_macros.h"
6 #include "base/strings/stringprintf.h" 6 #include "base/strings/stringprintf.h"
7 #include "chrome/browser/browser_process.h" 7 #include "chrome/browser/browser_process.h"
8 #include "chrome/browser/content_settings/permission_context_uma_util.h" 8 #include "chrome/browser/content_settings/permission_context_uma_util.h"
9 #include "components/rappor/rappor_utils.h" 9 #include "components/rappor/rappor_utils.h"
10 #include "content/public/browser/permission_type.h" 10 #include "content/public/browser/permission_type.h"
(...skipping 110 matching lines...) Expand 10 before | Expand all | Expand 10 after
121 #if defined(OS_ANDROID) || defined(OS_CHROMEOS) 121 #if defined(OS_ANDROID) || defined(OS_CHROMEOS)
122 case CONTENT_SETTINGS_TYPE_PROTECTED_MEDIA_IDENTIFIER: 122 case CONTENT_SETTINGS_TYPE_PROTECTED_MEDIA_IDENTIFIER:
123 PERMISSION_ACTION_UMA( 123 PERMISSION_ACTION_UMA(
124 secure_origin, 124 secure_origin,
125 "ContentSettings.PermissionActions_ProtectedMedia", 125 "ContentSettings.PermissionActions_ProtectedMedia",
126 "ContentSettings.PermissionActionsSecureOrigin_ProtectedMedia", 126 "ContentSettings.PermissionActionsSecureOrigin_ProtectedMedia",
127 "ContentSettings.PermissionActionsInsecureOrigin_ProtectedMedia", 127 "ContentSettings.PermissionActionsInsecureOrigin_ProtectedMedia",
128 action); 128 action);
129 break; 129 break;
130 #endif 130 #endif
131 case CONTENT_SETTINGS_TYPE_DURABLE_STORAGE:
132 PERMISSION_ACTION_UMA( // Cargo culted
133 secure_origin, "ContentSettings.PermissionActions_DurableStorage",
134 "ContentSettings.PermissionActionsSecureOrigin_DurableStorage",
135 "ContentSettings.PermissionActionsInsecureOrigin_DurableStorage",
136 action);
137 break;
131 default: 138 default:
132 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; 139 NOTREACHED() << "PERMISSION " << permission << " not accounted for";
133 } 140 }
134 141
135 const std::string& rappor_metric = GetRapporMetric(permission, action); 142 const std::string& rappor_metric = GetRapporMetric(permission, action);
136 if (!rappor_metric.empty()) 143 if (!rappor_metric.empty())
137 rappor::SampleDomainAndRegistryFromGURL( 144 rappor::SampleDomainAndRegistryFromGURL(
138 g_browser_process->rappor_service(), rappor_metric, 145 g_browser_process->rappor_service(), rappor_metric,
139 requesting_origin); 146 requesting_origin);
140 } 147 }
(...skipping 21 matching lines...) Expand all
162 type = PermissionType::MIDI_SYSEX; 169 type = PermissionType::MIDI_SYSEX;
163 break; 170 break;
164 case CONTENT_SETTINGS_TYPE_PUSH_MESSAGING: 171 case CONTENT_SETTINGS_TYPE_PUSH_MESSAGING:
165 type = PermissionType::PUSH_MESSAGING; 172 type = PermissionType::PUSH_MESSAGING;
166 break; 173 break;
167 #if defined(OS_ANDROID) || defined(OS_CHROMEOS) 174 #if defined(OS_ANDROID) || defined(OS_CHROMEOS)
168 case CONTENT_SETTINGS_TYPE_PROTECTED_MEDIA_IDENTIFIER: 175 case CONTENT_SETTINGS_TYPE_PROTECTED_MEDIA_IDENTIFIER:
169 type = PermissionType::PROTECTED_MEDIA_IDENTIFIER; 176 type = PermissionType::PROTECTED_MEDIA_IDENTIFIER;
170 break; 177 break;
171 #endif 178 #endif
179 case CONTENT_SETTINGS_TYPE_DURABLE_STORAGE:
180 type = content::PermissionType::DURABLE_STORAGE;
181 break;
172 default: 182 default:
173 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; 183 NOTREACHED() << "PERMISSION " << permission << " not accounted for";
174 return; 184 return;
175 } 185 }
176 UMA_HISTOGRAM_ENUMERATION( 186 UMA_HISTOGRAM_ENUMERATION(
177 "ContentSettings.PermissionRequested", 187 "ContentSettings.PermissionRequested",
178 static_cast<base::HistogramBase::Sample>(type), 188 static_cast<base::HistogramBase::Sample>(type),
179 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); 189 static_cast<base::HistogramBase::Sample>(PermissionType::NUM));
180 if (secure_origin) { 190 if (secure_origin) {
181 UMA_HISTOGRAM_ENUMERATION( 191 UMA_HISTOGRAM_ENUMERATION(
(...skipping 29 matching lines...) Expand all
211 221
212 void PermissionContextUmaUtil::PermissionDismissed( 222 void PermissionContextUmaUtil::PermissionDismissed(
213 ContentSettingsType permission, const GURL& requesting_origin) { 223 ContentSettingsType permission, const GURL& requesting_origin) {
214 RecordPermissionAction(permission, DISMISSED, requesting_origin); 224 RecordPermissionAction(permission, DISMISSED, requesting_origin);
215 } 225 }
216 226
217 void PermissionContextUmaUtil::PermissionIgnored( 227 void PermissionContextUmaUtil::PermissionIgnored(
218 ContentSettingsType permission, const GURL& requesting_origin) { 228 ContentSettingsType permission, const GURL& requesting_origin) {
219 RecordPermissionAction(permission, IGNORED, requesting_origin); 229 RecordPermissionAction(permission, IGNORED, requesting_origin);
220 } 230 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698