Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(19)

Side by Side Diff: chrome/browser/content_settings/permission_context_uma_util.cc

Issue 1197853005: Collecting statistics on iframe permissions use. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixed to use permission status. Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/metrics/histogram_macros.h" 5 #include "base/metrics/histogram_macros.h"
6 #include "base/strings/stringprintf.h" 6 #include "base/strings/stringprintf.h"
7 #include "chrome/browser/browser_process.h" 7 #include "chrome/browser/browser_process.h"
8 #include "chrome/browser/content_settings/permission_context_uma_util.h" 8 #include "chrome/browser/content_settings/permission_context_uma_util.h"
9 #include "chrome/browser/permissions/permission_manager.h"
10 #include "chrome/browser/profiles/profile.h"
9 #include "components/rappor/rappor_utils.h" 11 #include "components/rappor/rappor_utils.h"
10 #include "content/public/browser/permission_type.h" 12 #include "content/public/browser/permission_type.h"
11 #include "content/public/common/origin_util.h" 13 #include "content/public/common/origin_util.h"
12 #include "url/gurl.h" 14 #include "url/gurl.h"
13 15
14 // UMA keys need to be statically initialized so plain function would not 16 // UMA keys need to be statically initialized so plain function would not
15 // work. Use a Macro instead. 17 // work. Use a Macro instead.
16 #define PERMISSION_ACTION_UMA(secure_origin, permission, permission_secure, \ 18 #define PERMISSION_ACTION_UMA(secure_origin, permission, permission_secure, \
17 permission_insecure, action) \ 19 permission_insecure, action) \
18 UMA_HISTOGRAM_ENUMERATION(permission, action, PERMISSION_ACTION_NUM); \ 20 UMA_HISTOGRAM_ENUMERATION(permission, action, PERMISSION_ACTION_NUM); \
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after
132 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; 134 NOTREACHED() << "PERMISSION " << permission << " not accounted for";
133 } 135 }
134 136
135 const std::string& rappor_metric = GetRapporMetric(permission, action); 137 const std::string& rappor_metric = GetRapporMetric(permission, action);
136 if (!rappor_metric.empty()) 138 if (!rappor_metric.empty())
137 rappor::SampleDomainAndRegistryFromGURL( 139 rappor::SampleDomainAndRegistryFromGURL(
138 g_browser_process->rappor_service(), rappor_metric, 140 g_browser_process->rappor_service(), rappor_metric,
139 requesting_origin); 141 requesting_origin);
140 } 142 }
141 143
144 std::string PermissionTypeToString(PermissionType permission_type) {
145 switch (permission_type) {
146 case PermissionType::MIDI_SYSEX:
147 return "MidiSysex";
148 case PermissionType::PUSH_MESSAGING:
149 return "PushMessaging";
150 case PermissionType::NOTIFICATIONS:
151 return "Notifications";
152 case PermissionType::GEOLOCATION:
153 return "Geolocation";
154 case PermissionType::PROTECTED_MEDIA_IDENTIFIER:
155 return "ProtectedMediaIdentifier";
156 case PermissionType::NUM:
157 break;
158 }
159 return std::string();
160 NOTREACHED();
jww 2015/07/07 18:41:46 This NOTREACHED will, well, never be reached :-) T
keenanb 2015/07/07 21:02:59 oh, derp. done.
161 }
162
142 void RecordPermissionRequest(ContentSettingsType permission, 163 void RecordPermissionRequest(ContentSettingsType permission,
143 const GURL& requesting_origin) { 164 const GURL& requesting_origin,
165 const GURL& embedding_origin,
166 Profile* profile) {
144 bool secure_origin = content::IsOriginSecure(requesting_origin); 167 bool secure_origin = content::IsOriginSecure(requesting_origin);
145 PermissionType type; 168 PermissionType type;
146 switch (permission) { 169 switch (permission) {
147 case CONTENT_SETTINGS_TYPE_GEOLOCATION: 170 case CONTENT_SETTINGS_TYPE_GEOLOCATION:
148 type = PermissionType::GEOLOCATION; 171 type = PermissionType::GEOLOCATION;
149 rappor::SampleDomainAndRegistryFromGURL( 172 rappor::SampleDomainAndRegistryFromGURL(
150 g_browser_process->rappor_service(), 173 g_browser_process->rappor_service(),
151 "ContentSettings.PermissionRequested.Geolocation.Url", 174 "ContentSettings.PermissionRequested.Geolocation.Url",
152 requesting_origin); 175 requesting_origin);
153 break; 176 break;
(...skipping 27 matching lines...) Expand all
181 UMA_HISTOGRAM_ENUMERATION( 204 UMA_HISTOGRAM_ENUMERATION(
182 "ContentSettings.PermissionRequested_SecureOrigin", 205 "ContentSettings.PermissionRequested_SecureOrigin",
183 static_cast<base::HistogramBase::Sample>(type), 206 static_cast<base::HistogramBase::Sample>(type),
184 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); 207 static_cast<base::HistogramBase::Sample>(PermissionType::NUM));
185 } else { 208 } else {
186 UMA_HISTOGRAM_ENUMERATION( 209 UMA_HISTOGRAM_ENUMERATION(
187 "ContentSettings.PermissionRequested_InsecureOrigin", 210 "ContentSettings.PermissionRequested_InsecureOrigin",
188 static_cast<base::HistogramBase::Sample>(type), 211 static_cast<base::HistogramBase::Sample>(type),
189 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); 212 static_cast<base::HistogramBase::Sample>(PermissionType::NUM));
190 } 213 }
214
215 // In order to gauge the compatibility risk of implementing an improved
216 // iframe permissions security model, we would like to know the ratio of
217 // same-origin to cross-origin permission requests. Our estimate of this
218 // ratio could be somewhat biased by repeated requests coming from a
219 // single frame, but we expect this to be insignificant.
220 if (requesting_origin.GetOrigin() != embedding_origin.GetOrigin()) {
221 content::PermissionStatus embedding_permission_status =
222 profile->GetPermissionManager()->GetPermissionStatus(
223 type, embedding_origin, embedding_origin);
224 UMA_HISTOGRAM_ENUMERATION(
225 "Permissions.Requested.CrossOrigin_" + PermissionTypeToString(type),
226 embedding_permission_status, content::PERMISSION_STATUS_NUM);
227 } else {
228 UMA_HISTOGRAM_ENUMERATION(
229 "Permissions.Requested.SameOrigin",
230 static_cast<base::HistogramBase::Sample>(type),
231 static_cast<base::HistogramBase::Sample>(PermissionType::NUM));
232 }
191 } 233 }
192 234
193 } // namespace 235 } // namespace
194 236
195 // Make sure you update histograms.xml permission histogram_suffix if you 237 // Make sure you update histograms.xml permission histogram_suffix if you
196 // add new permission 238 // add new permission
197 void PermissionContextUmaUtil::PermissionRequested( 239 void PermissionContextUmaUtil::PermissionRequested(
198 ContentSettingsType permission, const GURL& requesting_origin) { 240 ContentSettingsType permission,
199 RecordPermissionRequest(permission, requesting_origin); 241 const GURL& requesting_origin,
242 const GURL& embedding_origin,
243 Profile* profile) {
244 RecordPermissionRequest(permission, requesting_origin, embedding_origin,
245 profile);
200 } 246 }
201 247
202 void PermissionContextUmaUtil::PermissionGranted( 248 void PermissionContextUmaUtil::PermissionGranted(
203 ContentSettingsType permission, const GURL& requesting_origin) { 249 ContentSettingsType permission, const GURL& requesting_origin) {
204 RecordPermissionAction(permission, GRANTED, requesting_origin); 250 RecordPermissionAction(permission, GRANTED, requesting_origin);
205 } 251 }
206 252
207 void PermissionContextUmaUtil::PermissionDenied( 253 void PermissionContextUmaUtil::PermissionDenied(
208 ContentSettingsType permission, const GURL& requesting_origin) { 254 ContentSettingsType permission, const GURL& requesting_origin) {
209 RecordPermissionAction(permission, DENIED, requesting_origin); 255 RecordPermissionAction(permission, DENIED, requesting_origin);
210 } 256 }
211 257
212 void PermissionContextUmaUtil::PermissionDismissed( 258 void PermissionContextUmaUtil::PermissionDismissed(
213 ContentSettingsType permission, const GURL& requesting_origin) { 259 ContentSettingsType permission, const GURL& requesting_origin) {
214 RecordPermissionAction(permission, DISMISSED, requesting_origin); 260 RecordPermissionAction(permission, DISMISSED, requesting_origin);
215 } 261 }
216 262
217 void PermissionContextUmaUtil::PermissionIgnored( 263 void PermissionContextUmaUtil::PermissionIgnored(
218 ContentSettingsType permission, const GURL& requesting_origin) { 264 ContentSettingsType permission, const GURL& requesting_origin) {
219 RecordPermissionAction(permission, IGNORED, requesting_origin); 265 RecordPermissionAction(permission, IGNORED, requesting_origin);
220 } 266 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698