Index: chrome/browser/safe_browsing/incident_reporting/off_domain_inclusion_detector.cc |
diff --git a/chrome/browser/safe_browsing/incident_reporting/off_domain_inclusion_detector.cc b/chrome/browser/safe_browsing/incident_reporting/off_domain_inclusion_detector.cc |
index 98f29d450acecb21efcf739b213a3687e21cfda0..c352b19540f2b20502a1e21bc91e9e5ebfb3baf7 100644 |
--- a/chrome/browser/safe_browsing/incident_reporting/off_domain_inclusion_detector.cc |
+++ b/chrome/browser/safe_browsing/incident_reporting/off_domain_inclusion_detector.cc |
@@ -145,6 +145,7 @@ bool OffDomainInclusionDetector::ShouldAnalyzeRequest( |
case content::RESOURCE_TYPE_OBJECT: |
case content::RESOURCE_TYPE_MEDIA: |
case content::RESOURCE_TYPE_XHR: |
+ case content::RESOURCE_TYPE_PLUGIN_RESOURCE: |
// Types above are to be analyzed for off-domain inclusion if they are |
// loaded as part of the main frame. |
return request_info->IsMainFrame(); |
@@ -154,6 +155,7 @@ bool OffDomainInclusionDetector::ShouldAnalyzeRequest( |
case content::RESOURCE_TYPE_FAVICON: |
case content::RESOURCE_TYPE_PING: |
case content::RESOURCE_TYPE_SERVICE_WORKER: |
+ case content::RESOURCE_TYPE_CSP_REPORT: |
// Types above are not to be analyzed for off-domain inclusion. |
return false; |
case content::RESOURCE_TYPE_LAST_TYPE: |
@@ -311,7 +313,7 @@ void OffDomainInclusionDetector::ReportAnalysisResult( |
// Always record this histogram for the resource type analyzed to be able to |
// do ratio analysis w.r.t. other histograms below. |
- UMA_HISTOGRAM_ENUMERATION("SBOffDomainInclusion.RequestAnalyzed", |
+ UMA_HISTOGRAM_ENUMERATION("SBOffDomainInclusion2.RequestAnalyzed", |
off_domain_inclusion_info->resource_type, |
content::RESOURCE_TYPE_LAST_TYPE); |
@@ -322,28 +324,28 @@ void OffDomainInclusionDetector::ReportAnalysisResult( |
case AnalysisEvent::NO_EVENT: |
break; |
case AnalysisEvent::ABORT_EMPTY_MAIN_FRAME_URL: |
- histogram_name = "SBOffDomainInclusion.Abort.EmptyMainFrameURL"; |
+ histogram_name = "SBOffDomainInclusion2.Abort.EmptyMainFrameURL"; |
break; |
case AnalysisEvent::ABORT_NO_PROFILE: |
- histogram_name = "SBOffDomainInclusion.Abort.NoProfile"; |
+ histogram_name = "SBOffDomainInclusion2.Abort.NoProfile"; |
break; |
case AnalysisEvent::ABORT_INCOGNITO: |
- histogram_name = "SBOffDomainInclusion.Abort.Incognito"; |
+ histogram_name = "SBOffDomainInclusion2.Abort.Incognito"; |
break; |
case AnalysisEvent::ABORT_NO_HISTORY_SERVICE: |
- histogram_name = "SBOffDomainInclusion.Abort.NoHistoryService"; |
+ histogram_name = "SBOffDomainInclusion2.Abort.NoHistoryService"; |
break; |
case AnalysisEvent::ABORT_HISTORY_LOOKUP_FAILED: |
- histogram_name = "SBOffDomainInclusion.Abort.HistoryLookupFailed"; |
+ histogram_name = "SBOffDomainInclusion2.Abort.HistoryLookupFailed"; |
break; |
case AnalysisEvent::OFF_DOMAIN_INCLUSION_WHITELISTED: |
- histogram_name = "SBOffDomainInclusion.Whitelisted"; |
+ histogram_name = "SBOffDomainInclusion2.Whitelisted"; |
break; |
case AnalysisEvent::OFF_DOMAIN_INCLUSION_IN_HISTORY: |
- histogram_name = "SBOffDomainInclusion.InHistory"; |
+ histogram_name = "SBOffDomainInclusion2.InHistory"; |
break; |
case AnalysisEvent::OFF_DOMAIN_INCLUSION_SUSPICIOUS: |
- histogram_name = "SBOffDomainInclusion.Suspicious"; |
+ histogram_name = "SBOffDomainInclusion2.Suspicious"; |
break; |
} |
if (!histogram_name.empty()) { |