OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
| 5 #include "chrome/browser/permissions/permission_context_uma_util.h" |
| 6 |
5 #include "base/metrics/histogram_macros.h" | 7 #include "base/metrics/histogram_macros.h" |
6 #include "base/strings/stringprintf.h" | 8 #include "base/strings/stringprintf.h" |
7 #include "chrome/browser/browser_process.h" | 9 #include "chrome/browser/browser_process.h" |
8 #include "chrome/browser/permissions/permission_context_uma_util.h" | 10 #include "chrome/browser/permissions/permission_manager.h" |
| 11 #include "chrome/browser/profiles/profile.h" |
9 #include "components/rappor/rappor_utils.h" | 12 #include "components/rappor/rappor_utils.h" |
10 #include "content/public/browser/permission_type.h" | 13 #include "content/public/browser/permission_type.h" |
11 #include "content/public/common/origin_util.h" | 14 #include "content/public/common/origin_util.h" |
12 #include "url/gurl.h" | 15 #include "url/gurl.h" |
13 | 16 |
14 // UMA keys need to be statically initialized so plain function would not | 17 // UMA keys need to be statically initialized so plain function would not |
15 // work. Use a Macro instead. | 18 // work. Use a Macro instead. |
16 #define PERMISSION_ACTION_UMA(secure_origin, permission, permission_secure, \ | 19 #define PERMISSION_ACTION_UMA(secure_origin, permission, permission_secure, \ |
17 permission_insecure, action) \ | 20 permission_insecure, action) \ |
18 UMA_HISTOGRAM_ENUMERATION(permission, action, PERMISSION_ACTION_NUM); \ | 21 UMA_HISTOGRAM_ENUMERATION(permission, action, PERMISSION_ACTION_NUM); \ |
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
132 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; | 135 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; |
133 } | 136 } |
134 | 137 |
135 const std::string& rappor_metric = GetRapporMetric(permission, action); | 138 const std::string& rappor_metric = GetRapporMetric(permission, action); |
136 if (!rappor_metric.empty()) | 139 if (!rappor_metric.empty()) |
137 rappor::SampleDomainAndRegistryFromGURL( | 140 rappor::SampleDomainAndRegistryFromGURL( |
138 g_browser_process->rappor_service(), rappor_metric, | 141 g_browser_process->rappor_service(), rappor_metric, |
139 requesting_origin); | 142 requesting_origin); |
140 } | 143 } |
141 | 144 |
| 145 std::string PermissionTypeToString(PermissionType permission_type) { |
| 146 switch (permission_type) { |
| 147 case PermissionType::MIDI_SYSEX: |
| 148 return "MidiSysex"; |
| 149 case PermissionType::PUSH_MESSAGING: |
| 150 return "PushMessaging"; |
| 151 case PermissionType::NOTIFICATIONS: |
| 152 return "Notifications"; |
| 153 case PermissionType::GEOLOCATION: |
| 154 return "Geolocation"; |
| 155 case PermissionType::PROTECTED_MEDIA_IDENTIFIER: |
| 156 return "ProtectedMediaIdentifier"; |
| 157 case PermissionType::NUM: |
| 158 break; |
| 159 } |
| 160 NOTREACHED(); |
| 161 return std::string(); |
| 162 } |
| 163 |
142 void RecordPermissionRequest(ContentSettingsType permission, | 164 void RecordPermissionRequest(ContentSettingsType permission, |
143 const GURL& requesting_origin) { | 165 const GURL& requesting_origin, |
| 166 const GURL& embedding_origin, |
| 167 Profile* profile) { |
144 bool secure_origin = content::IsOriginSecure(requesting_origin); | 168 bool secure_origin = content::IsOriginSecure(requesting_origin); |
145 PermissionType type; | 169 PermissionType type; |
146 switch (permission) { | 170 switch (permission) { |
147 case CONTENT_SETTINGS_TYPE_GEOLOCATION: | 171 case CONTENT_SETTINGS_TYPE_GEOLOCATION: |
148 type = PermissionType::GEOLOCATION; | 172 type = PermissionType::GEOLOCATION; |
149 rappor::SampleDomainAndRegistryFromGURL( | 173 rappor::SampleDomainAndRegistryFromGURL( |
150 g_browser_process->rappor_service(), | 174 g_browser_process->rappor_service(), |
151 "ContentSettings.PermissionRequested.Geolocation.Url", | 175 "ContentSettings.PermissionRequested.Geolocation.Url", |
152 requesting_origin); | 176 requesting_origin); |
153 break; | 177 break; |
(...skipping 27 matching lines...) Expand all Loading... |
181 UMA_HISTOGRAM_ENUMERATION( | 205 UMA_HISTOGRAM_ENUMERATION( |
182 "ContentSettings.PermissionRequested_SecureOrigin", | 206 "ContentSettings.PermissionRequested_SecureOrigin", |
183 static_cast<base::HistogramBase::Sample>(type), | 207 static_cast<base::HistogramBase::Sample>(type), |
184 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); | 208 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); |
185 } else { | 209 } else { |
186 UMA_HISTOGRAM_ENUMERATION( | 210 UMA_HISTOGRAM_ENUMERATION( |
187 "ContentSettings.PermissionRequested_InsecureOrigin", | 211 "ContentSettings.PermissionRequested_InsecureOrigin", |
188 static_cast<base::HistogramBase::Sample>(type), | 212 static_cast<base::HistogramBase::Sample>(type), |
189 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); | 213 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); |
190 } | 214 } |
| 215 |
| 216 // In order to gauge the compatibility risk of implementing an improved |
| 217 // iframe permissions security model, we would like to know the ratio of |
| 218 // same-origin to cross-origin permission requests. Our estimate of this |
| 219 // ratio could be somewhat biased by repeated requests coming from a |
| 220 // single frame, but we expect this to be insignificant. |
| 221 if (requesting_origin.GetOrigin() != embedding_origin.GetOrigin()) { |
| 222 content::PermissionManager* manager = profile->GetPermissionManager(); |
| 223 if (!manager) |
| 224 return; |
| 225 content::PermissionStatus embedding_permission_status = |
| 226 manager->GetPermissionStatus(type, embedding_origin, embedding_origin); |
| 227 |
| 228 base::HistogramBase* histogram = base::LinearHistogram::FactoryGet( |
| 229 "Permissions.Requested.CrossOrigin_" + PermissionTypeToString(type), 1, |
| 230 content::PERMISSION_STATUS_LAST, content::PERMISSION_STATUS_LAST + 1, |
| 231 base::HistogramBase::kUmaTargetedHistogramFlag); |
| 232 histogram->Add(embedding_permission_status); |
| 233 } else { |
| 234 UMA_HISTOGRAM_ENUMERATION( |
| 235 "Permissions.Requested.SameOrigin", |
| 236 static_cast<base::HistogramBase::Sample>(type), |
| 237 static_cast<base::HistogramBase::Sample>(PermissionType::NUM)); |
| 238 } |
191 } | 239 } |
192 | 240 |
193 } // namespace | 241 } // namespace |
194 | 242 |
195 // Make sure you update histograms.xml permission histogram_suffix if you | 243 // Make sure you update histograms.xml permission histogram_suffix if you |
196 // add new permission | 244 // add new permission |
197 void PermissionContextUmaUtil::PermissionRequested( | 245 void PermissionContextUmaUtil::PermissionRequested( |
198 ContentSettingsType permission, const GURL& requesting_origin) { | 246 ContentSettingsType permission, |
199 RecordPermissionRequest(permission, requesting_origin); | 247 const GURL& requesting_origin, |
| 248 const GURL& embedding_origin, |
| 249 Profile* profile) { |
| 250 RecordPermissionRequest(permission, requesting_origin, embedding_origin, |
| 251 profile); |
200 } | 252 } |
201 | 253 |
202 void PermissionContextUmaUtil::PermissionGranted( | 254 void PermissionContextUmaUtil::PermissionGranted( |
203 ContentSettingsType permission, const GURL& requesting_origin) { | 255 ContentSettingsType permission, const GURL& requesting_origin) { |
204 RecordPermissionAction(permission, GRANTED, requesting_origin); | 256 RecordPermissionAction(permission, GRANTED, requesting_origin); |
205 } | 257 } |
206 | 258 |
207 void PermissionContextUmaUtil::PermissionDenied( | 259 void PermissionContextUmaUtil::PermissionDenied( |
208 ContentSettingsType permission, const GURL& requesting_origin) { | 260 ContentSettingsType permission, const GURL& requesting_origin) { |
209 RecordPermissionAction(permission, DENIED, requesting_origin); | 261 RecordPermissionAction(permission, DENIED, requesting_origin); |
210 } | 262 } |
211 | 263 |
212 void PermissionContextUmaUtil::PermissionDismissed( | 264 void PermissionContextUmaUtil::PermissionDismissed( |
213 ContentSettingsType permission, const GURL& requesting_origin) { | 265 ContentSettingsType permission, const GURL& requesting_origin) { |
214 RecordPermissionAction(permission, DISMISSED, requesting_origin); | 266 RecordPermissionAction(permission, DISMISSED, requesting_origin); |
215 } | 267 } |
216 | 268 |
217 void PermissionContextUmaUtil::PermissionIgnored( | 269 void PermissionContextUmaUtil::PermissionIgnored( |
218 ContentSettingsType permission, const GURL& requesting_origin) { | 270 ContentSettingsType permission, const GURL& requesting_origin) { |
219 RecordPermissionAction(permission, IGNORED, requesting_origin); | 271 RecordPermissionAction(permission, IGNORED, requesting_origin); |
220 } | 272 } |
OLD | NEW |