| // Copyright 2014 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/permissions/permission_uma_util.h" |
| |
| #include <utility> |
| |
| #include "base/command_line.h" |
| #include "base/metrics/histogram_functions.h" |
| #include "base/metrics/histogram_macros.h" |
| #include "base/time/time.h" |
| #include "build/build_config.h" |
| #include "chrome/browser/browser_process.h" |
| #include "chrome/browser/engagement/site_engagement_service.h" |
| #include "chrome/browser/permissions/permission_decision_auto_blocker.h" |
| #include "chrome/browser/permissions/permission_request.h" |
| #include "chrome/browser/permissions/permission_util.h" |
| #include "chrome/browser/profiles/profile.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| #include "chrome/browser/safe_browsing/ui_manager.h" |
| #include "chrome/browser/sync/profile_sync_service_factory.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/pref_names.h" |
| #include "components/browser_sync/profile_sync_service.h" |
| #include "components/prefs/pref_service.h" |
| #include "content/public/browser/permission_type.h" |
| #include "content/public/browser/web_contents.h" |
| #include "content/public/common/origin_util.h" |
| #include "url/gurl.h" |
| |
| #if defined(OS_ANDROID) |
| #include "base/android/jni_string.h" |
| #include "jni/PermissionUmaUtil_jni.h" |
| #endif |
| |
| // UMA keys need to be statically initialized so plain function would not |
| // work. Use macros instead. |
| #define PERMISSION_ACTION_UMA(secure_origin, permission, permission_secure, \ |
| permission_insecure, action) \ |
| UMA_HISTOGRAM_ENUMERATION(permission, action, PermissionAction::NUM); \ |
| if (secure_origin) { \ |
| UMA_HISTOGRAM_ENUMERATION(permission_secure, action, \ |
| PermissionAction::NUM); \ |
| } else { \ |
| UMA_HISTOGRAM_ENUMERATION(permission_insecure, action, \ |
| PermissionAction::NUM); \ |
| } |
| |
| #define PERMISSION_BUBBLE_TYPE_UMA(metric_name, permission_bubble_type) \ |
| UMA_HISTOGRAM_ENUMERATION(metric_name, permission_bubble_type, \ |
| PermissionRequestType::NUM) |
| |
| #define PERMISSION_BUBBLE_GESTURE_TYPE_UMA(gesture_metric_name, \ |
| no_gesture_metric_name, \ |
| gesture_type, \ |
| permission_bubble_type) \ |
| if (gesture_type == PermissionRequestGestureType::GESTURE) { \ |
| PERMISSION_BUBBLE_TYPE_UMA(gesture_metric_name, permission_bubble_type); \ |
| } else if (gesture_type == PermissionRequestGestureType::NO_GESTURE) { \ |
| PERMISSION_BUBBLE_TYPE_UMA(no_gesture_metric_name, \ |
| permission_bubble_type); \ |
| } |
| |
| using content::PermissionType; |
| |
| namespace { |
| |
| static bool gIsFakeOfficialBuildForTest = false; |
| |
| std::string GetPermissionRequestString(PermissionRequestType type) { |
| switch (type) { |
| case PermissionRequestType::MULTIPLE: |
| return "AudioAndVideoCapture"; |
| case PermissionRequestType::QUOTA: |
| return "Quota"; |
| case PermissionRequestType::DOWNLOAD: |
| return "MultipleDownload"; |
| case PermissionRequestType::REGISTER_PROTOCOL_HANDLER: |
| return "RegisterProtocolHandler"; |
| case PermissionRequestType::PERMISSION_GEOLOCATION: |
| return "Geolocation"; |
| case PermissionRequestType::PERMISSION_MIDI_SYSEX: |
| return "MidiSysEx"; |
| case PermissionRequestType::PERMISSION_NOTIFICATIONS: |
| return "Notifications"; |
| case PermissionRequestType::PERMISSION_PROTECTED_MEDIA_IDENTIFIER: |
| return "ProtectedMedia"; |
| case PermissionRequestType::PERMISSION_FLASH: |
| return "Flash"; |
| case PermissionRequestType::PERMISSION_MEDIASTREAM_MIC: |
| return "AudioCapture"; |
| case PermissionRequestType::PERMISSION_MEDIASTREAM_CAMERA: |
| return "VideoCapture"; |
| case PermissionRequestType::PERMISSION_CLIPBOARD_READ: |
| return "ClipboardRead"; |
| default: |
| NOTREACHED(); |
| return ""; |
| } |
| } |
| |
| void RecordEngagementMetric(const std::vector<PermissionRequest*>& requests, |
| const content::WebContents* web_contents, |
| const std::string& action) { |
| PermissionRequestType type = requests[0]->GetPermissionRequestType(); |
| if (requests.size() > 1) |
| type = PermissionRequestType::MULTIPLE; |
| |
| DCHECK(action == "Accepted" || action == "Denied" || action == "Dismissed" || |
| action == "Ignored"); |
| std::string name = "Permissions.Engagement." + action + '.' + |
| GetPermissionRequestString(type); |
| |
| SiteEngagementService* site_engagement_service = SiteEngagementService::Get( |
| Profile::FromBrowserContext(web_contents->GetBrowserContext())); |
| double engagement_score = |
| site_engagement_service->GetScore(requests[0]->GetOrigin()); |
| |
| base::UmaHistogramPercentage(name, engagement_score); |
| } |
| |
| } // anonymous namespace |
| |
| // PermissionReportInfo ------------------------------------------------------- |
| PermissionReportInfo::PermissionReportInfo( |
| const GURL& origin, |
| ContentSettingsType permission, |
| PermissionAction action, |
| PermissionSourceUI source_ui, |
| PermissionRequestGestureType gesture_type, |
| int num_prior_dismissals, |
| int num_prior_ignores) |
| : origin(origin), permission(permission), action(action), |
| source_ui(source_ui), gesture_type(gesture_type), |
| num_prior_dismissals(num_prior_dismissals), |
| num_prior_ignores(num_prior_ignores) {} |
| |
| PermissionReportInfo::PermissionReportInfo( |
| const PermissionReportInfo& other) = default; |
| |
| // PermissionUmaUtil ---------------------------------------------------------- |
| |
| const char PermissionUmaUtil::kPermissionsPromptShown[] = |
| "Permissions.Prompt.Shown"; |
| const char PermissionUmaUtil::kPermissionsPromptShownGesture[] = |
| "Permissions.Prompt.Shown.Gesture"; |
| const char PermissionUmaUtil::kPermissionsPromptShownNoGesture[] = |
| "Permissions.Prompt.Shown.NoGesture"; |
| const char PermissionUmaUtil::kPermissionsPromptAccepted[] = |
| "Permissions.Prompt.Accepted"; |
| const char PermissionUmaUtil::kPermissionsPromptAcceptedGesture[] = |
| "Permissions.Prompt.Accepted.Gesture"; |
| const char PermissionUmaUtil::kPermissionsPromptAcceptedNoGesture[] = |
| "Permissions.Prompt.Accepted.NoGesture"; |
| const char PermissionUmaUtil::kPermissionsPromptDenied[] = |
| "Permissions.Prompt.Denied"; |
| const char PermissionUmaUtil::kPermissionsPromptDeniedGesture[] = |
| "Permissions.Prompt.Denied.Gesture"; |
| const char PermissionUmaUtil::kPermissionsPromptDeniedNoGesture[] = |
| "Permissions.Prompt.Denied.NoGesture"; |
| const char |
| PermissionUmaUtil::kPermissionsPromptAcceptedPriorDismissCountPrefix[] = |
| "Permissions.Prompt.Accepted.PriorDismissCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptAcceptedPriorIgnoreCountPrefix[] = |
| "Permissions.Prompt.Accepted.PriorIgnoreCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptDeniedPriorDismissCountPrefix[] = |
| "Permissions.Prompt.Denied.PriorDismissCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptDeniedPriorIgnoreCountPrefix[] = |
| "Permissions.Prompt.Denied.PriorIgnoreCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptDismissedPriorDismissCountPrefix[] = |
| "Permissions.Prompt.Dismissed.PriorDismissCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptDismissedPriorIgnoreCountPrefix[] = |
| "Permissions.Prompt.Dismissed.PriorIgnoreCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptIgnoredPriorDismissCountPrefix[] = |
| "Permissions.Prompt.Ignored.PriorDismissCount."; |
| const char |
| PermissionUmaUtil::kPermissionsPromptIgnoredPriorIgnoreCountPrefix[] = |
| "Permissions.Prompt.Ignored.PriorIgnoreCount."; |
| |
| // Make sure you update histograms.xml permission histogram_suffix if you |
| // add new permission |
| void PermissionUmaUtil::PermissionRequested(ContentSettingsType content_type, |
| const GURL& requesting_origin) { |
| PermissionType permission; |
| bool success = PermissionUtil::GetPermissionType(content_type, &permission); |
| DCHECK(success); |
| |
| bool secure_origin = content::IsOriginSecure(requesting_origin); |
| UMA_HISTOGRAM_ENUMERATION("ContentSettings.PermissionRequested", permission, |
| PermissionType::NUM); |
| if (secure_origin) { |
| UMA_HISTOGRAM_ENUMERATION( |
| "ContentSettings.PermissionRequested_SecureOrigin", permission, |
| PermissionType::NUM); |
| } else { |
| UMA_HISTOGRAM_ENUMERATION( |
| "ContentSettings.PermissionRequested_InsecureOrigin", permission, |
| PermissionType::NUM); |
| } |
| } |
| |
| void PermissionUmaUtil::PermissionGranted( |
| ContentSettingsType permission, |
| PermissionRequestGestureType gesture_type, |
| const GURL& requesting_origin, |
| Profile* profile) { |
| PermissionDecisionAutoBlocker* autoblocker = |
| PermissionDecisionAutoBlocker::GetForProfile(profile); |
| RecordPermissionAction(permission, PermissionAction::GRANTED, |
| PermissionSourceUI::PROMPT, gesture_type, |
| requesting_origin, profile); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptAcceptedPriorDismissCountPrefix, |
| autoblocker->GetDismissCount(requesting_origin, permission)); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptAcceptedPriorIgnoreCountPrefix, |
| autoblocker->GetIgnoreCount(requesting_origin, permission)); |
| #if defined(OS_ANDROID) |
| if (permission == CONTENT_SETTINGS_TYPE_GEOLOCATION) |
| RecordWithBatteryBucket("Permissions.BatteryLevel.Accepted.Geolocation"); |
| #endif |
| } |
| |
| void PermissionUmaUtil::PermissionDenied( |
| ContentSettingsType permission, |
| PermissionRequestGestureType gesture_type, |
| const GURL& requesting_origin, |
| Profile* profile) { |
| PermissionDecisionAutoBlocker* autoblocker = |
| PermissionDecisionAutoBlocker::GetForProfile(profile); |
| RecordPermissionAction(permission, PermissionAction::DENIED, |
| PermissionSourceUI::PROMPT, gesture_type, |
| requesting_origin, profile); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptDeniedPriorDismissCountPrefix, |
| autoblocker->GetDismissCount(requesting_origin, permission)); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptDeniedPriorIgnoreCountPrefix, |
| autoblocker->GetIgnoreCount(requesting_origin, permission)); |
| #if defined(OS_ANDROID) |
| if (permission == CONTENT_SETTINGS_TYPE_GEOLOCATION) |
| RecordWithBatteryBucket("Permissions.BatteryLevel.Denied.Geolocation"); |
| #endif |
| } |
| |
| void PermissionUmaUtil::PermissionDismissed( |
| ContentSettingsType permission, |
| PermissionRequestGestureType gesture_type, |
| const GURL& requesting_origin, |
| Profile* profile) { |
| PermissionDecisionAutoBlocker* autoblocker = |
| PermissionDecisionAutoBlocker::GetForProfile(profile); |
| RecordPermissionAction(permission, PermissionAction::DISMISSED, |
| PermissionSourceUI::PROMPT, gesture_type, |
| requesting_origin, profile); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptDismissedPriorDismissCountPrefix, |
| autoblocker->GetDismissCount(requesting_origin, permission)); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptDismissedPriorIgnoreCountPrefix, |
| autoblocker->GetIgnoreCount(requesting_origin, permission)); |
| #if defined(OS_ANDROID) |
| if (permission == CONTENT_SETTINGS_TYPE_GEOLOCATION) |
| RecordWithBatteryBucket("Permissions.BatteryLevel.Dismissed.Geolocation"); |
| #endif |
| } |
| |
| void PermissionUmaUtil::PermissionRevoked(ContentSettingsType permission, |
| PermissionSourceUI source_ui, |
| const GURL& revoked_origin, |
| Profile* profile) { |
| // TODO(tsergeant): Expand metrics definitions for revocation to include all |
| // permissions. |
| if (permission == CONTENT_SETTINGS_TYPE_NOTIFICATIONS || |
| permission == CONTENT_SETTINGS_TYPE_GEOLOCATION || |
| permission == CONTENT_SETTINGS_TYPE_MEDIASTREAM_MIC || |
| permission == CONTENT_SETTINGS_TYPE_MEDIASTREAM_CAMERA) { |
| // An unknown gesture type is passed in since gesture type is only |
| // applicable in prompt UIs where revocations are not possible. |
| RecordPermissionAction(permission, PermissionAction::REVOKED, source_ui, |
| PermissionRequestGestureType::UNKNOWN, |
| revoked_origin, profile); |
| } |
| } |
| |
| void PermissionUmaUtil::RecordEmbargoPromptSuppression( |
| PermissionEmbargoStatus embargo_status) { |
| UMA_HISTOGRAM_ENUMERATION("Permissions.AutoBlocker.EmbargoPromptSuppression", |
| embargo_status, PermissionEmbargoStatus::NUM); |
| } |
| |
| void PermissionUmaUtil::RecordEmbargoPromptSuppressionFromSource( |
| PermissionStatusSource source) { |
| // Explicitly switch to ensure that any new PermissionStatusSource values are |
| // dealt with appropriately. |
| switch (source) { |
| case PermissionStatusSource::MULTIPLE_DISMISSALS: |
| PermissionUmaUtil::RecordEmbargoPromptSuppression( |
| PermissionEmbargoStatus::REPEATED_DISMISSALS); |
| break; |
| case PermissionStatusSource::MULTIPLE_IGNORES: |
| PermissionUmaUtil::RecordEmbargoPromptSuppression( |
| PermissionEmbargoStatus::REPEATED_IGNORES); |
| break; |
| case PermissionStatusSource::SAFE_BROWSING_BLACKLIST: |
| PermissionUmaUtil::RecordEmbargoPromptSuppression( |
| PermissionEmbargoStatus::PERMISSIONS_BLACKLISTING); |
| break; |
| case PermissionStatusSource::UNSPECIFIED: |
| case PermissionStatusSource::KILL_SWITCH: |
| case PermissionStatusSource::INSECURE_ORIGIN: |
| case PermissionStatusSource::FEATURE_POLICY: |
| // The permission wasn't under embargo, so don't record anything. We may |
| // embargo it later. |
| break; |
| } |
| } |
| |
| void PermissionUmaUtil::RecordEmbargoStatus( |
| PermissionEmbargoStatus embargo_status) { |
| UMA_HISTOGRAM_ENUMERATION("Permissions.AutoBlocker.EmbargoStatus", |
| embargo_status, PermissionEmbargoStatus::NUM); |
| } |
| |
| void PermissionUmaUtil::RecordSafeBrowsingResponse( |
| base::TimeDelta response_time, |
| SafeBrowsingResponse response) { |
| UMA_HISTOGRAM_TIMES("Permissions.AutoBlocker.SafeBrowsingResponseTime", |
| response_time); |
| UMA_HISTOGRAM_ENUMERATION("Permissions.AutoBlocker.SafeBrowsingResponse", |
| response, SafeBrowsingResponse::NUM); |
| } |
| |
| void PermissionUmaUtil::PermissionPromptShown( |
| const std::vector<PermissionRequest*>& requests) { |
| DCHECK(!requests.empty()); |
| |
| PermissionRequestType permission_prompt_type = |
| PermissionRequestType::MULTIPLE; |
| PermissionRequestGestureType permission_gesture_type = |
| PermissionRequestGestureType::UNKNOWN; |
| if (requests.size() == 1) { |
| permission_prompt_type = requests[0]->GetPermissionRequestType(); |
| permission_gesture_type = requests[0]->GetGestureType(); |
| } |
| |
| RecordPermissionPromptShown(permission_prompt_type, permission_gesture_type); |
| } |
| |
| void PermissionUmaUtil::PermissionPromptResolved( |
| const std::vector<PermissionRequest*>& requests, |
| const content::WebContents* web_contents, |
| PermissionAction permission_action) { |
| switch (permission_action) { |
| case PermissionAction::GRANTED: |
| RecordPromptDecided(requests, /*accepted=*/true); |
| RecordEngagementMetric(requests, web_contents, "Accepted"); |
| break; |
| case PermissionAction::DENIED: |
| RecordPromptDecided(requests, /*accepted=*/false); |
| RecordEngagementMetric(requests, web_contents, "Denied"); |
| break; |
| case PermissionAction::DISMISSED: |
| RecordEngagementMetric(requests, web_contents, "Dismissed"); |
| break; |
| case PermissionAction::IGNORED: |
| RecordEngagementMetric(requests, web_contents, "Ignored"); |
| PermissionIgnored(requests, web_contents); |
| break; |
| default: |
| NOTREACHED(); |
| break; |
| } |
| } |
| |
| void PermissionUmaUtil::RecordPermissionPromptShown( |
| PermissionRequestType request_type, |
| PermissionRequestGestureType gesture_type) { |
| PERMISSION_BUBBLE_TYPE_UMA(kPermissionsPromptShown, request_type); |
| PERMISSION_BUBBLE_GESTURE_TYPE_UMA( |
| kPermissionsPromptShownGesture, kPermissionsPromptShownNoGesture, |
| gesture_type, request_type); |
| } |
| |
| void PermissionUmaUtil::RecordPermissionPromptAccepted( |
| PermissionRequestType request_type, |
| PermissionRequestGestureType gesture_type) { |
| PERMISSION_BUBBLE_TYPE_UMA(kPermissionsPromptAccepted, request_type); |
| PERMISSION_BUBBLE_GESTURE_TYPE_UMA(kPermissionsPromptAcceptedGesture, |
| kPermissionsPromptAcceptedNoGesture, |
| gesture_type, request_type); |
| } |
| |
| void PermissionUmaUtil::RecordPermissionPromptDenied( |
| PermissionRequestType request_type, |
| PermissionRequestGestureType gesture_type) { |
| PERMISSION_BUBBLE_TYPE_UMA(kPermissionsPromptDenied, request_type); |
| PERMISSION_BUBBLE_GESTURE_TYPE_UMA(kPermissionsPromptDeniedGesture, |
| kPermissionsPromptDeniedNoGesture, |
| gesture_type, request_type); |
| } |
| |
| void PermissionUmaUtil::RecordPermissionPromptPriorCount( |
| ContentSettingsType permission, |
| const std::string& prefix, |
| int count) { |
| // The user is not prompted for this permissions, thus there is no prompt |
| // event to record a prior count for. |
| DCHECK_NE(CONTENT_SETTINGS_TYPE_BACKGROUND_SYNC, permission); |
| |
| // Expand UMA_HISTOGRAM_COUNTS_100 so that we can use a dynamically suffixed |
| // histogram name. |
| base::Histogram::FactoryGet( |
| prefix + PermissionUtil::GetPermissionString(permission), 1, 100, 50, |
| base::HistogramBase::kUmaTargetedHistogramFlag) |
| ->Add(count); |
| } |
| |
| #if defined(OS_ANDROID) |
| void PermissionUmaUtil::RecordWithBatteryBucket(const std::string& histogram) { |
| JNIEnv* env = base::android::AttachCurrentThread(); |
| Java_PermissionUmaUtil_recordWithBatteryBucket( |
| env, base::android::ConvertUTF8ToJavaString(env, histogram)); |
| } |
| #endif |
| |
| void PermissionUmaUtil::FakeOfficialBuildForTest() { |
| gIsFakeOfficialBuildForTest = true; |
| } |
| |
| bool PermissionUmaUtil::IsOptedIntoPermissionActionReporting(Profile* profile) { |
| if (base::CommandLine::ForCurrentProcess()->HasSwitch( |
| switches::kDisablePermissionActionReporting)) { |
| return false; |
| } |
| |
| bool official_build = gIsFakeOfficialBuildForTest; |
| #if defined(OFFICIAL_BUILD) && defined(GOOGLE_CHROME_BUILD) |
| official_build = true; |
| #endif |
| |
| if (!official_build) |
| return false; |
| |
| DCHECK(profile); |
| if (profile->GetProfileType() == Profile::INCOGNITO_PROFILE) |
| return false; |
| if (!profile->GetPrefs()->GetBoolean(prefs::kSafeBrowsingEnabled)) |
| return false; |
| |
| browser_sync::ProfileSyncService* profile_sync_service = |
| ProfileSyncServiceFactory::GetForProfile(profile); |
| |
| // Do not report if profile can't get a profile sync service or sync cannot |
| // start. |
| if (!(profile_sync_service && profile_sync_service->CanSyncStart())) |
| return false; |
| |
| // Do not report for users with a Custom passphrase set. We need to wait for |
| // Sync to be active in order to check the passphrase, so we don't report if |
| // Sync is not active yet. |
| if (!profile_sync_service->IsSyncActive() || |
| profile_sync_service->IsUsingSecondaryPassphrase()) { |
| return false; |
| } |
| |
| syncer::ModelTypeSet preferred_data_types = |
| profile_sync_service->GetPreferredDataTypes(); |
| if (!(preferred_data_types.Has(syncer::PROXY_TABS) && |
| preferred_data_types.Has(syncer::PRIORITY_PREFERENCES))) { |
| return false; |
| } |
| |
| return true; |
| } |
| |
| void PermissionUmaUtil::RecordPermissionAction( |
| ContentSettingsType permission, |
| PermissionAction action, |
| PermissionSourceUI source_ui, |
| PermissionRequestGestureType gesture_type, |
| const GURL& requesting_origin, |
| Profile* profile) { |
| if (IsOptedIntoPermissionActionReporting(profile)) { |
| PermissionDecisionAutoBlocker* autoblocker = |
| PermissionDecisionAutoBlocker::GetForProfile(profile); |
| PermissionReportInfo report_info( |
| requesting_origin, permission, action, source_ui, gesture_type, |
| autoblocker->GetDismissCount(requesting_origin, permission), |
| autoblocker->GetIgnoreCount(requesting_origin, permission)); |
| g_browser_process->safe_browsing_service() |
| ->ui_manager()->ReportPermissionAction(report_info); |
| } |
| |
| bool secure_origin = content::IsOriginSecure(requesting_origin); |
| |
| switch (permission) { |
| // Geolocation, MidiSysEx, Push, Media and Clipboard permissions are |
| // disabled on insecure origins, so there's no need to record separate |
| // metrics for secure/insecure. |
| case CONTENT_SETTINGS_TYPE_GEOLOCATION: |
| UMA_HISTOGRAM_ENUMERATION("Permissions.Action.Geolocation", action, |
| PermissionAction::NUM); |
| break; |
| case CONTENT_SETTINGS_TYPE_NOTIFICATIONS: |
| PERMISSION_ACTION_UMA(secure_origin, "Permissions.Action.Notifications", |
| "Permissions.Action.SecureOrigin.Notifications", |
| "Permissions.Action.InsecureOrigin.Notifications", |
| action); |
| break; |
| case CONTENT_SETTINGS_TYPE_MIDI_SYSEX: |
| UMA_HISTOGRAM_ENUMERATION("Permissions.Action.MidiSysEx", action, |
| PermissionAction::NUM); |
| break; |
| case CONTENT_SETTINGS_TYPE_PROTECTED_MEDIA_IDENTIFIER: |
| PERMISSION_ACTION_UMA(secure_origin, "Permissions.Action.ProtectedMedia", |
| "Permissions.Action.SecureOrigin.ProtectedMedia", |
| "Permissions.Action.InsecureOrigin.ProtectedMedia", |
| action); |
| break; |
| case CONTENT_SETTINGS_TYPE_MEDIASTREAM_MIC: |
| UMA_HISTOGRAM_ENUMERATION("Permissions.Action.AudioCapture", action, |
| PermissionAction::NUM); |
| break; |
| case CONTENT_SETTINGS_TYPE_MEDIASTREAM_CAMERA: |
| UMA_HISTOGRAM_ENUMERATION("Permissions.Action.VideoCapture", action, |
| PermissionAction::NUM); |
| break; |
| case CONTENT_SETTINGS_TYPE_PLUGINS: |
| PERMISSION_ACTION_UMA(secure_origin, "Permissions.Action.Flash", |
| "Permissions.Action.SecureOrigin.Flash", |
| "Permissions.Action.InsecureOrigin.Flash", action); |
| break; |
| case CONTENT_SETTINGS_TYPE_CLIPBOARD_READ: |
| UMA_HISTOGRAM_ENUMERATION("Permissions.Action.ClipboardRead", action, |
| PermissionAction::NUM); |
| break; |
| // The user is not prompted for these permissions, thus there is no |
| // permission action recorded for them. |
| default: |
| NOTREACHED() << "PERMISSION " |
| << PermissionUtil::GetPermissionString(permission) |
| << " not accounted for"; |
| } |
| } |
| |
| // static |
| void PermissionUmaUtil::RecordPromptDecided( |
| const std::vector<PermissionRequest*>& requests, |
| bool accepted) { |
| DCHECK(!requests.empty()); |
| |
| PermissionRequestType permission_prompt_type = |
| requests[0]->GetPermissionRequestType(); |
| PermissionRequestGestureType permission_gesture_type = |
| requests[0]->GetGestureType(); |
| if (requests.size() > 1) { |
| permission_prompt_type = PermissionRequestType::MULTIPLE; |
| permission_gesture_type = PermissionRequestGestureType::UNKNOWN; |
| } |
| |
| if (accepted) { |
| RecordPermissionPromptAccepted(permission_prompt_type, |
| permission_gesture_type); |
| } else { |
| RecordPermissionPromptDenied(permission_prompt_type, |
| permission_gesture_type); |
| } |
| } |
| |
| // static |
| void PermissionUmaUtil::PermissionIgnored( |
| const std::vector<PermissionRequest*>& requests, |
| const content::WebContents* web_contents) { |
| Profile* profile = |
| Profile::FromBrowserContext(web_contents->GetBrowserContext()); |
| PermissionDecisionAutoBlocker* autoblocker = |
| PermissionDecisionAutoBlocker::GetForProfile(profile); |
| |
| for (PermissionRequest* request : requests) { |
| ContentSettingsType permission = request->GetContentSettingsType(); |
| // TODO(timloh): We only record ignore metrics for permissions which use |
| // PermissionRequestImpl as the other subclasses don't support |
| // GetGestureType and GetContentSettingsType. |
| if (permission == CONTENT_SETTINGS_TYPE_DEFAULT) |
| continue; |
| |
| PermissionRequestGestureType gesture_type = request->GetGestureType(); |
| const GURL& requesting_origin = request->GetOrigin(); |
| |
| RecordPermissionAction(permission, PermissionAction::IGNORED, |
| PermissionSourceUI::PROMPT, gesture_type, |
| requesting_origin, profile); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptIgnoredPriorDismissCountPrefix, |
| autoblocker->GetDismissCount(requesting_origin, permission)); |
| RecordPermissionPromptPriorCount( |
| permission, kPermissionsPromptIgnoredPriorIgnoreCountPrefix, |
| autoblocker->GetIgnoreCount(requesting_origin, permission)); |
| } |
| } |