109
109
#include " mozilla/Casting.h"
110
110
#include " mozilla/RefPtr.h"
111
111
#include " mozilla/StaticPrefs_security.h"
112
- #include " mozilla/Telemetry.h"
113
112
#include " mozilla/UniquePtr.h"
114
113
#include " mozilla/Unused.h"
115
114
#include " mozilla/glean/SecurityManagerSslMetrics.h"
@@ -443,7 +442,7 @@ static SECStatus BlockServerCertChangeForSpdy(
443
442
}
444
443
445
444
void GatherTelemetryForSingleSCT (const ct::VerifiedSCT& verifiedSct) {
446
- // See SSL_SCTS_VERIFICATION_STATUS in Histograms.json .
445
+ // See scts_verification_status in metrics.yaml .
447
446
uint32_t verificationStatus = 0 ;
448
447
switch (verifiedSct.logState ) {
449
448
case ct::CTLogState::Admissible:
@@ -453,8 +452,8 @@ void GatherTelemetryForSingleSCT(const ct::VerifiedSCT& verifiedSct) {
453
452
verificationStatus = 5 ;
454
453
break ;
455
454
}
456
- Telemetry::Accumulate (Telemetry::SSL_SCTS_VERIFICATION_STATUS,
457
- verificationStatus);
455
+ glean::ssl::scts_verification_status. AccumulateSingleSample (
456
+ verificationStatus);
458
457
}
459
458
460
459
void GatherCertificateTransparencyTelemetry (
@@ -469,45 +468,45 @@ void GatherCertificateTransparencyTelemetry(
469
468
GatherTelemetryForSingleSCT (sct);
470
469
}
471
470
472
- // See SSL_SCTS_VERIFICATION_STATUS in Histograms.json .
471
+ // See scts_verification_status in metrics.yaml .
473
472
for (size_t i = 0 ; i < info.verifyResult .decodingErrors ; ++i) {
474
- Telemetry::Accumulate (Telemetry::SSL_SCTS_VERIFICATION_STATUS, 0 );
473
+ glean::ssl::scts_verification_status. AccumulateSingleSample ( 0 );
475
474
}
476
475
for (size_t i = 0 ; i < info.verifyResult .sctsFromUnknownLogs ; ++i) {
477
- Telemetry::Accumulate (Telemetry::SSL_SCTS_VERIFICATION_STATUS, 2 );
476
+ glean::ssl::scts_verification_status. AccumulateSingleSample ( 2 );
478
477
}
479
478
for (size_t i = 0 ; i < info.verifyResult .sctsWithInvalidSignatures ; ++i) {
480
- Telemetry::Accumulate (Telemetry::SSL_SCTS_VERIFICATION_STATUS, 3 );
479
+ glean::ssl::scts_verification_status. AccumulateSingleSample ( 3 );
481
480
}
482
481
for (size_t i = 0 ; i < info.verifyResult .sctsWithInvalidTimestamps ; ++i) {
483
- Telemetry::Accumulate (Telemetry::SSL_SCTS_VERIFICATION_STATUS, 4 );
482
+ glean::ssl::scts_verification_status. AccumulateSingleSample ( 4 );
484
483
}
485
484
486
- // See SSL_SCTS_ORIGIN in Histograms.json .
485
+ // See scts_origin in metrics.yaml .
487
486
for (size_t i = 0 ; i < info.verifyResult .embeddedSCTs ; ++i) {
488
- Telemetry::Accumulate (Telemetry::SSL_SCTS_ORIGIN, 1 );
487
+ glean::ssl::scts_origin. AccumulateSingleSample ( 1 );
489
488
}
490
489
for (size_t i = 0 ; i < info.verifyResult .sctsFromTLSHandshake ; ++i) {
491
- Telemetry::Accumulate (Telemetry::SSL_SCTS_ORIGIN, 2 );
490
+ glean::ssl::scts_origin. AccumulateSingleSample ( 2 );
492
491
}
493
492
for (size_t i = 0 ; i < info.verifyResult .sctsFromOCSP ; ++i) {
494
- Telemetry::Accumulate (Telemetry::SSL_SCTS_ORIGIN, 3 );
493
+ glean::ssl::scts_origin. AccumulateSingleSample ( 3 );
495
494
}
496
495
497
496
// Handle the histogram of SCTs counts.
498
497
uint32_t sctsCount =
499
498
static_cast <uint32_t >(info.verifyResult .verifiedScts .size ());
500
499
// Note that sctsCount can also be 0 in case we've received SCT binary data,
501
500
// but it failed to parse (e.g. due to unsupported CT protocol version).
502
- Telemetry::Accumulate (Telemetry::SSL_SCTS_PER_CONNECTION, sctsCount);
501
+ glean::ssl::scts_per_connection. AccumulateSingleSample ( sctsCount);
503
502
504
503
// Report CT Policy compliance by CA.
505
504
if (info.policyCompliance .isSome () &&
506
505
*info.policyCompliance != ct::CTPolicyCompliance::Compliant) {
507
506
int32_t binId = RootCABinNumber (rootCert);
508
507
if (binId != ROOT_CERTIFICATE_HASH_FAILURE) {
509
- Telemetry::Accumulate (
510
- Telemetry::SSL_CT_POLICY_NON_COMPLIANT_CONNECTIONS_BY_CA_2, binId);
508
+ glean::ssl::ct_policy_non_compliant_connections_by_ca
509
+ . AccumulateSingleSample ( binId);
511
510
}
512
511
}
513
512
}
@@ -529,7 +528,7 @@ static void CollectCertTelemetry(
529
528
glean::cert::ev_status.AccumulateSingleSample (evStatus);
530
529
531
530
if (aOcspStaplingStatus != CertVerifier::OCSP_STAPLING_NEVER_CHECKED) {
532
- Telemetry::Accumulate (Telemetry::SSL_OCSP_STAPLING, aOcspStaplingStatus);
531
+ glean::ssl::ocsp_stapling. AccumulateSingleSample ( aOcspStaplingStatus);
533
532
}
534
533
535
534
if (aKeySizeStatus != KeySizeStatus::NeverChecked) {
@@ -660,7 +659,7 @@ PRErrorCode AuthCertificateParseResults(
660
659
nsITransportSecurityInfo::OverridableErrorCategory&
661
660
aOverridableErrorCategory) {
662
661
uint32_t probeValue = MapCertErrorToProbeValue (aCertVerificationError);
663
- Telemetry::Accumulate (Telemetry::SSL_CERT_VERIFICATION_ERRORS, probeValue);
662
+ glean::ssl::cert_verification_errors. AccumulateSingleSample ( probeValue);
664
663
665
664
Maybe<nsITransportSecurityInfo::OverridableErrorCategory>
666
665
maybeOverridableErrorCategory =
@@ -703,7 +702,7 @@ PRErrorCode AuthCertificateParseResults(
703
702
if (haveOverride) {
704
703
uint32_t probeValue =
705
704
MapOverridableErrorToProbeValue (aCertVerificationError);
706
- Telemetry::Accumulate (Telemetry::SSL_CERT_ERROR_OVERRIDES, probeValue);
705
+ glean::ssl::cert_error_overrides. AccumulateSingleSample ( probeValue);
707
706
MOZ_LOG (gPIPNSSLog , LogLevel::Debug,
708
707
(" [0x%" PRIx64 " ] certificate error overridden" , aPtrForLog));
709
708
return 0 ;
@@ -804,7 +803,7 @@ SSLServerCertVerificationJob::Run() {
804
803
if (result == Success) {
805
804
mozilla::glean::cert_verification_time::success.AccumulateRawDuration (
806
805
elapsed);
807
- Telemetry::Accumulate (Telemetry::SSL_CERT_ERROR_OVERRIDES, 1 );
806
+ glean::ssl::cert_error_overrides. AccumulateSingleSample ( 1 );
808
807
809
808
nsresult rv = mResultTask ->Dispatch (
810
809
std::move (builtChainBytesArray), std::move (mPeerCertChain ),
0 commit comments