metrics.yaml (27390B)
1 # This Source Code Form is subject to the terms of the Mozilla Public 2 # License, v. 2.0. If a copy of the MPL was not distributed with this 3 # file, You can obtain one at http://mozilla.org/MPL/2.0/. 4 5 # Adding a new metric? We have docs for that! 6 # https://firefox-source-docs.mozilla.org/toolkit/components/glean/user/new_definitions_file.html 7 8 --- 9 $schema: moz://mozilla.org/schemas/glean/metrics/2-0-0 10 $tags: 11 - 'Core :: DOM: Security' 12 13 httpsfirst: 14 upgraded: 15 type: counter 16 description: > 17 Counts how often a load is successfully upgraded to HTTPS because of 18 HTTPS-First (`dom.security.https_first` enabled). This does not include 19 loads that get downgraded again. 20 bugs: 21 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 22 data_reviews: 23 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 24 data_sensitivity: 25 - technical 26 notification_emails: 27 - mjurgens@mozilla.com 28 - seceng-telemetry@mozilla.com 29 expires: never 30 31 upgraded_schemeless: 32 type: counter 33 description: > 34 Counts how often a load is successfully upgraded to HTTPS because of 35 schemeless HTTPS-First (`dom.security.https_first` disabled, but load 36 marked as schemeless). This does not include loads that get downgraded 37 again. 38 bugs: 39 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 40 data_reviews: 41 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 42 data_sensitivity: 43 - technical 44 notification_emails: 45 - mjurgens@mozilla.com 46 - seceng-telemetry@mozilla.com 47 expires: never 48 49 downgraded: 50 type: counter 51 description: > 52 How many regular HTTPS-First (`dom.security.https_first` enabled) 53 upgrades fail and get downgraded again. 54 bugs: 55 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 56 data_reviews: 57 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 58 data_sensitivity: 59 - technical 60 notification_emails: 61 - mjurgens@mozilla.com 62 - seceng-telemetry@mozilla.com 63 expires: never 64 65 downgraded_schemeless: 66 type: counter 67 description: > 68 How many schemeless HTTPS-First (`dom.security.https_first` disabled, but 69 load marked as schemeless) upgrades fail and get downgraded again. 70 bugs: 71 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 72 data_reviews: 73 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 74 data_sensitivity: 75 - technical 76 notification_emails: 77 - mjurgens@mozilla.com 78 - seceng-telemetry@mozilla.com 79 expires: never 80 81 downgraded_on_timer: 82 type: rate 83 description: > 84 How many HTTPS-First (`dom.security.https_first` enabled) upgrades get 85 downgraded again because the HTTP request fired after 3s received a answer 86 faster than the HTTPS request. 87 denominator_metric: httpsfirst.downgraded 88 bugs: 89 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 90 data_reviews: 91 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 92 data_sensitivity: 93 - technical 94 notification_emails: 95 - mjurgens@mozilla.com 96 - seceng-telemetry@mozilla.com 97 expires: never 98 99 downgraded_on_timer_schemeless: 100 type: rate 101 description: > 102 How many of schemeless HTTPS-First (`dom.security.https_first` disabled, 103 but load marked as schemeless) upgrades get downgraded again because the 104 HTTP request fired after 3s received a answer faster than the HTTPS 105 request 106 denominator_metric: httpsfirst.downgraded_schemeless 107 bugs: 108 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 109 data_reviews: 110 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 111 data_sensitivity: 112 - technical 113 notification_emails: 114 - mjurgens@mozilla.com 115 - seceng-telemetry@mozilla.com 116 expires: never 117 118 downgrade_time: 119 type: timing_distribution 120 description: > 121 If a HTTPS-First (`dom.security.https_first` enabled) upgrade isn't 122 successful, measures the timespan between the navigation start and the 123 downgrade. 124 time_unit: millisecond 125 bugs: 126 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 127 data_reviews: 128 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 129 data_sensitivity: 130 - technical 131 notification_emails: 132 - mjurgens@mozilla.com 133 - seceng-telemetry@mozilla.com 134 expires: never 135 136 downgrade_time_schemeless: 137 type: timing_distribution 138 description: > 139 If a schemeless HTTPS-First (`dom.security.https_first` disabled, but load 140 marked as schemeless) upgrade isn't successful, measures the timespan 141 between the navigation start and the downgrade. 142 time_unit: millisecond 143 bugs: 144 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380 145 data_reviews: 146 - https://bugzilla.mozilla.org/show_bug.cgi?id=1868380#c10 147 data_sensitivity: 148 - technical 149 notification_emails: 150 - mjurgens@mozilla.com 151 - seceng-telemetry@mozilla.com 152 expires: never 153 154 unexpected_script_load: 155 infobar_shown: 156 type: event 157 description: > 158 The infobar has been shown to the user 159 bugs: 160 - https://bugzil.la/1979341 161 data_reviews: 162 - https://bugzil.la/1979341 163 notification_emails: 164 - fbraun@mozilla.com 165 - tritter@mozilla.com 166 expires: never 167 send_in_pings: 168 - unexpected-script-load 169 infobar_dismissed: 170 type: event 171 description: > 172 The user clicked the X on the infobar to dismiss it. 173 bugs: 174 - https://bugzil.la/1979341 175 data_reviews: 176 - https://bugzil.la/1979341 177 notification_emails: 178 - fbraun@mozilla.com 179 - tritter@mozilla.com 180 expires: never 181 send_in_pings: 182 - unexpected-script-load 183 dialog_dismissed: 184 type: event 185 description: > 186 The user clicked the X on the dialog, or hit Escape, to dismiss it. 187 bugs: 188 - https://bugzil.la/1979341 189 data_reviews: 190 - https://bugzil.la/1979341 191 notification_emails: 192 - fbraun@mozilla.com 193 - tritter@mozilla.com 194 expires: never 195 send_in_pings: 196 - unexpected-script-load 197 script_allowed_opened: 198 type: event 199 description: > 200 The user opened the script allowed dialog. 201 bugs: 202 - https://bugzil.la/1979341 203 data_reviews: 204 - https://bugzil.la/1979341 205 notification_emails: 206 - fbraun@mozilla.com 207 - tritter@mozilla.com 208 expires: never 209 send_in_pings: 210 - unexpected-script-load 211 script_blocked_opened: 212 type: event 213 description: > 214 The user opened the script blocked dialog. 215 bugs: 216 - https://bugzil.la/1979341 217 data_reviews: 218 - https://bugzil.la/1979341 219 notification_emails: 220 - fbraun@mozilla.com 221 - tritter@mozilla.com 222 expires: never 223 send_in_pings: 224 - unexpected-script-load 225 more_info_opened: 226 type: event 227 description: > 228 The user opened the more info link to go to the SUMO page. 229 bugs: 230 - https://bugzil.la/1979341 231 data_reviews: 232 - https://bugzil.la/1979341 233 notification_emails: 234 - fbraun@mozilla.com 235 - tritter@mozilla.com 236 expires: never 237 send_in_pings: 238 - unexpected-script-load 239 script_allowed: 240 type: event 241 description: > 242 The user allowed the script. 243 bugs: 244 - https://bugzil.la/1979341 245 data_reviews: 246 - https://bugzil.la/1979341 247 notification_emails: 248 - fbraun@mozilla.com 249 - tritter@mozilla.com 250 expires: never 251 send_in_pings: 252 - unexpected-script-load 253 script_blocked: 254 type: event 255 description: > 256 The user blocked the script. 257 bugs: 258 - https://bugzil.la/1979341 259 data_reviews: 260 - https://bugzil.la/1979341 261 notification_emails: 262 - fbraun@mozilla.com 263 - tritter@mozilla.com 264 expires: never 265 send_in_pings: 266 - unexpected-script-load 267 script_reported: 268 type: event 269 description: > 270 The user reported the script. 271 bugs: 272 - https://bugzil.la/1979341 273 data_reviews: 274 - https://bugzil.la/1979341 275 notification_emails: 276 - fbraun@mozilla.com 277 - tritter@mozilla.com 278 expires: never 279 send_in_pings: 280 - unexpected-script-load 281 extra_keys: 282 script_url: 283 description: > 284 The URL of the script the user has reported 285 type: string 286 user_email: 287 description: > 288 The email address of the user who reported the script 289 type: string 290 291 security: 292 unexpected_load: 293 type: event 294 description: > 295 Long term want to block all loads from the system principal that 296 cause us to parse non-trivial data. We don't look to break existing 297 functionality and will allow exceptions, for this we are collecting 298 information about unexpected requests triggered by the system 299 principal Our measurement *excludes* acceptable requests. Those are: 300 - annotated using the 'AllowedDeprecatedSystemRequests' loadinfo 301 flag - using a nsContentPolicyType of FETCH, XMLHTTPREQUEST, 302 WEBSOCKET, SAVEAS_DOWNLOAD or IMAGE - with a requested URI object 303 has the flag URI_IS_UI_RESOURCE - if the URL scheme is 'view-source' 304 - if the URL scheme is 'file' and the Content-Type is STYLESHEET or 305 OTHER - if the scheme is 'jar', 'about' or 'moz-extension' 306 This event was generated to correspond to the Legacy Telemetry event 307 security.unexpectedload#systemprincipal. 308 bugs: 309 - https://bugzil.la/1644671 310 data_reviews: 311 - https://bugzil.la/1644671 312 notification_emails: 313 - fbraun@mozilla.com 314 - ckerschb@mozilla.com 315 expires: never 316 extra_keys: 317 value: 318 description: > 319 The `value` of the event. Mirrors to the Legacy Telemetry 320 event's `value` parameter. 321 The filename's type, see 322 `nsContentSecurityUtils::FilenameToFilenameType(...)`. 323 type: string 324 contenttype: 325 description: > 326 Information about the content-type we expect to receive 327 type: string 328 remotetype: 329 description: > 330 Information about the remoteType in which we triggered the load 331 type: string 332 filedetails: 333 description: > 334 Information about the file that triggered the load 335 type: string 336 redirects: 337 description: > 338 Comma-separated string listing schemes for URLs that we redirected from 339 type: string 340 telemetry_mirror: Security_Unexpectedload_Systemprincipal 341 342 eval_usage_system_context: 343 type: event 344 # Disable yamllint for long lines 345 # yamllint disable 346 description: > 347 eval() (or an eval()-like method) was called while running in the 348 System Principal context or the Parent Process. 349 Expected values are: 350 - chromeuri - chrome:// file 351 - resourceuri - resource:// file 352 - mozsrcuri - moz-src:// file 353 - datauri - a data URI 354 - bloburi - a blob URI 355 - abouturi - an about URI 356 - singlestring - A single file or string with no slashes 357 - mozillaextension - An extension claiming to be from *mozilla.org (Deprecated) 358 - otherextension - Another extension not from Mozilla (Deprecated) 359 - mozillaextension_file - An extension claiming to be from *mozilla.org, loaded from a file:// 360 - otherextension_file - Another extension not from Mozilla, loaded from a file:// 361 - extension_uri - A URI with the moz-extension:// scheme 362 - suspectedUserChromeJS - A filepath ending in .uc.js 363 - sanitizedWindowsPath - A filepath, on Windows, sanitized by WinUtils::PreparePathForTelemetry which is a bare filename or a subpath of %ProgramFiles%, %SystemRoot%, or %TEMP% 364 - sanitizedWindowsURL - A partial URL, on Windows, consisting of either file://../ followed by the value prepared as for sanitizedWindowsPath, or the bare scheme of the original url 365 - other - Unknown 366 - other-on-worker - We cannot do a regex; it is not a chrome, resource, data, or blob uri, but could be any other. 367 - regexfailure - Our Regex Matching code threw an error 368 369 The fileinfo key may contain additional information about the file that 370 caused the eval() depending on the above value. Resource, Chrome, 371 About, and SingleString will contain the full value. (About URIs 372 will remove any querystring values.) 373 374 Extensions-from-file will contain the full value; however .xpi! will be shortened to !, 375 shield.mozilla.org! to s! and mozilla.org! to m!. Data, Blob, 376 UserChromeJS, Other, and Regexfailure should have no value. 377 378 This event was generated to correspond to the Legacy Telemetry event 379 security.evalUsage#systemContext. 380 # yamllint enable 381 bugs: &security_evalUsage_bugs 382 - https://bugzil.la/1567623 383 data_reviews: &security_evalUsage_data_reviews 384 - https://bugzil.la/1567623 385 notification_emails: 386 - tom@mozilla.com 387 - ckerschb@mozilla.com 388 expires: never 389 extra_keys: &security_evalUsage_extra 390 value: 391 description: > 392 The `value` of the event. Mirrors to the Legacy Telemetry 393 event's `value` parameter. 394 The filename's type, see 395 `nsContentSecurityUtils::FilenameToFilenameType(...)`. 396 type: string 397 fileinfo: 398 description: > 399 Information about the file that triggered eval 400 type: string 401 telemetry_mirror: Security_Evalusage_Systemcontext 402 403 csp_violation_internal_page: 404 type: event 405 description: > 406 Information about Content-Security-Policy violations that happen in internal pages like chrome:// 407 bugs: 408 - https://bugzil.la/1942622 409 data_reviews: 410 - https://bugzil.la/1942622 411 notification_emails: 412 - tschuster@mozilla.com 413 - freddy@mozilla.com 414 expires: never 415 extra_keys: 416 directive: 417 description: > 418 The same as SecurityPolicyViolationEvent's effectiveDirective. 419 type: string 420 selftype: 421 description: > 422 The sanitized type of the "self uri", which is roughly similar to the documentURI. 423 This follows eval_usage_system_context sanitization procedure. 424 type: string 425 selfdetails: 426 description: > 427 A sanitized version of the "self uri", which is roughly similar to the documentURI, 428 e.g. the whole chrome:// URL in some cases. 429 This follows eval_usage_system_context sanitization procedure. 430 type: string 431 sourcetype: 432 description: > 433 The sanitized type of SecurityPolicyViolationEvent's sourceFile, 434 e.g. "chromeuri". 435 This follows eval_usage_system_context sanitization procedure. 436 type: string 437 sourcedetails: 438 description: > 439 A sanitized version of SecurityPolicyViolationEvent's sourceFile, 440 e.g. the whole chrome:// URL in some cases. 441 This follows eval_usage_system_context sanitization procedure. 442 type: string 443 blockeduritype: 444 description: > 445 The sanitized type of SecurityPolicyViolationEvent's blockedURI. 446 type: string 447 blockeduridetails: 448 description: > 449 A sanitized version of SecurityPolicyViolationEvent's blockedURI. 450 type: string 451 linenumber: 452 description: > 453 The same as SecurityPolicyViolationEvent's lineNumber. 454 type: quantity 455 columnnumber: 456 description: > 457 The same as SecurityPolicyViolationEvent's columnNumber. 458 type: quantity 459 sample: 460 description: > 461 The same as SecurityPolicyViolationEvent's sample. 462 (Only for violations from chrome:) 463 type: string 464 465 466 eval_usage_parent_process: 467 type: event 468 description: > 469 eval() (or an eval()-like method) was called while running in the 470 System Principal context or the Parent Process. Expected values are: 471 chromeuri - chrome:// file resourceuri - resource:// file 472 datauri - a data URI bloburi - a blob URI abouturi - an about 473 URI singlestring - A single file or string with no slashes 474 mozillaextension - An extension claiming to be from *mozilla.org 475 (Deprecated) otherextension - Another extension not from Mozilla 476 (Deprecated) mozillaextension_file - An extension claiming to be 477 from *mozilla.org, loaded from a file:// otherextension_file - 478 Another extension not from Mozilla, loaded from a file:// 479 extension_uri - A URI with the moz-extension:// scheme 480 suspectedUserChromeJS - A filepath ending in .uc.js 481 sanitizedWindowsPath - A filepath, on Windows, sanitized by 482 WinUtils::PreparePathForTelemetry which is 483 a bare filename or a subpath of %ProgramFiles%, %SystemRoot%, 484 or %TEMP% sanitizedWindowsURL - A partial URL, on Windows, 485 consisting of either file://../ followed by 486 the value prepared as for sanitizedWindowsPath, or the bare scheme 487 of the original url other - Unknown 488 other-on-worker - We cannot do a regex; it is not a chrome, 489 resource, data, or blob uri, but could be any 490 other. regexfailure - Our Regex Matching code threw an error The 491 fileinfo key may contain additional information about the file that 492 caused the eval() depending on the above value. Resource, Chrome, 493 About, and SingleString will contain the full value. (About URIs 494 will remove any querystring values.) Extensions-from-file will 495 contain the full value; however .xpi! will be shortened to !, 496 shield.mozilla.org! to s! and mozilla.org! to m!. Data, Blob, 497 UserChromeJS, Other, and Regexfailure should have no value. 498 This event was generated to correspond to the Legacy Telemetry event 499 security.evalUsage#parentProcess. 500 bugs: *security_evalUsage_bugs 501 data_reviews: *security_evalUsage_data_reviews 502 notification_emails: 503 - tom@mozilla.com 504 - ckerschb@mozilla.com 505 expires: never 506 extra_keys: *security_evalUsage_extra 507 telemetry_mirror: Security_Evalusage_Parentprocess 508 509 javascript_load_parent_process: 510 type: event 511 description: > 512 The javascript engine requested to load a filename that was not 513 allowed. Expected values, and fileinfo key, are the same possible 514 values as above in 'evalUsage' 515 This event was generated to correspond to the Legacy Telemetry event 516 security.javascriptLoad#parentProcess. 517 bugs: 518 - https://bugzil.la/1582512 519 - https://bugzil.la/1983112 520 data_reviews: 521 - https://bugzil.la/1582512 522 notification_emails: 523 - tom@mozilla.com 524 - gijs@mozilla.com 525 expires: never 526 extra_keys: 527 value: 528 description: > 529 The `value` of the event. Mirrors to the Legacy Telemetry 530 event's `value` parameter. 531 The filename's type, see 532 `nsContentSecurityUtils::FilenameToFilenameType(...)`. 533 type: string 534 fileinfo: 535 description: > 536 Information about the filename that was requested to be loaded 537 type: string 538 blocked: 539 description: > 540 Whether the load was blocked using our temporary pref 541 type: boolean 542 543 https_only_mode_upgrade_time: 544 type: labeled_timing_distribution 545 description: > 546 Time it takes for a request that has been upgraded with HTTPS-Only Mode to 547 complete, broken down by top-level (top) / sub-resource (sub) and status 548 549 This metric was generated to correspond to the Legacy Telemetry 550 exponential histogram HTTPS_ONLY_MODE_UPGRADE_TIME_MS. 551 time_unit: millisecond 552 labels: 553 - top_successful 554 - sub_successful 555 - top_f_redirectloop 556 - sub_f_redirectloop 557 - top_f_timeout 558 - sub_f_timeout 559 - top_f_aborted 560 - sub_f_aborted 561 - top_f_cxnrefused 562 - sub_f_cxnrefused 563 - top_f_ssl_selfsignd 564 - sub_f_ssl_selfsignd 565 - top_f_ssl_badcertdm 566 - sub_f_ssl_badcertdm 567 - top_f_ssl_unkwnissr 568 - sub_f_ssl_unkwnissr 569 - top_f_ssl_other 570 - sub_f_ssl_other 571 - top_f_other 572 - sub_f_other 573 bugs: 574 - https://bugzilla.mozilla.org/show_bug.cgi?id=1627206 575 data_reviews: 576 - https://bugzilla.mozilla.org/show_bug.cgi?id=1627206 577 notification_emails: 578 - julianwels@mozilla.com 579 - seceng-telemetry@mozilla.com 580 expires: never 581 telemetry_mirror: HTTPS_ONLY_MODE_UPGRADE_TIME_MS 582 583 https_only_mode_upgrade_type: 584 type: dual_labeled_counter 585 description: > 586 What content type did we upgrade, and did it load successfully? 587 588 This metric was generated to correspond to the Legacy Telemetry boolean 589 histogram HTTPS_ONLY_MODE_UPGRADE_TYPE. 590 dual_labels: 591 key: 592 labels: 593 - "unknown" 594 - "audio" 595 - "video" 596 - "script" 597 - "object" 598 - "document" 599 - "subdocument" 600 - "xmlhttprequest" 601 - "image" 602 - "dtd" 603 - "font" 604 - "fetch" 605 - "websocket" 606 - "stylesheet" 607 - "cspreport" 608 - "webmanifest" 609 - "ping" 610 - "xslt" 611 - "proxied-webrtc" 612 description: External content policy type. 613 category: 614 labels: 615 - "false" 616 - "true" 617 description: Boolean 618 bugs: 619 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675533 620 data_reviews: 621 - https://bugzilla.mozilla.org/show_bug.cgi?id=1675533 622 notification_emails: 623 - seceng-telemetry@mozilla.com 624 - julianwels@mozilla.com 625 expires: never 626 telemetry_mirror: HTTPS_ONLY_MODE_UPGRADE_TYPE 627 628 referrer_policy_count: 629 type: custom_distribution 630 description: > 631 The counter of each referrer policy which has been computed for a 632 referrer. The buckets (0-8) are for same-site requests and buckets (9-17) 633 are for cross-site requests. Note that the index matches to the order in 634 ReferrerPolicy.webidl 635 636 This metric was generated to correspond to the Legacy Telemetry enumerated 637 histogram REFERRER_POLICY_COUNT. 638 range_min: 0 639 range_max: 18 640 bucket_count: 19 641 histogram_type: linear 642 bugs: 643 - https://bugzilla.mozilla.org/show_bug.cgi?id=1720869 644 data_reviews: 645 - https://bugzilla.mozilla.org/show_bug.cgi?id=1720869 646 notification_emails: 647 - tihuang@mozilla.com 648 - ckerschbaumer@mozilla.com 649 - seceng-telemetry@mozilla.com 650 expires: never 651 telemetry_mirror: REFERRER_POLICY_COUNT 652 653 mixed_content: 654 page_load: 655 type: custom_distribution 656 description: > 657 Accumulates type of content per page load (0=no mixed or non-secure page, 658 1=mixed passive, 2=mixed active, 3=mixed passive and mixed active) 659 660 This metric was generated to correspond to the Legacy Telemetry enumerated 661 histogram MIXED_CONTENT_PAGE_LOAD. 662 range_min: 0 663 range_max: 4 664 bucket_count: 5 665 histogram_type: linear 666 bugs: 667 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 668 data_reviews: 669 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 670 notification_emails: 671 - seceng-telemetry@mozilla.com 672 expires: never 673 telemetry_mirror: MIXED_CONTENT_PAGE_LOAD 674 675 unblock_counter: 676 type: custom_distribution 677 description: > 678 A simple counter of daily mixed-content unblock operations and top 679 documents loaded 680 681 This metric was generated to correspond to the Legacy Telemetry enumerated 682 histogram MIXED_CONTENT_UNBLOCK_COUNTER. 683 range_min: 0 684 range_max: 3 685 bucket_count: 4 686 histogram_type: linear 687 bugs: 688 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 689 data_reviews: 690 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 691 notification_emails: 692 - seceng-telemetry@mozilla.com 693 expires: never 694 telemetry_mirror: MIXED_CONTENT_UNBLOCK_COUNTER 695 696 hsts: 697 type: custom_distribution 698 description: > 699 How often would blocked mixed content be allowed if HSTS upgrades were 700 allowed? 0=display/no-HSTS, 1=display/HSTS, 2=active/no-HSTS, 701 3=active/HSTS 702 703 This metric was generated to correspond to the Legacy Telemetry enumerated 704 histogram MIXED_CONTENT_HSTS. 705 range_min: 0 706 range_max: 10 707 bucket_count: 11 708 histogram_type: linear 709 bugs: 710 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 711 data_reviews: 712 - https://bugzilla.mozilla.org/show_bug.cgi?id=1935420 713 notification_emails: 714 - seceng-telemetry@mozilla.com 715 expires: never 716 telemetry_mirror: MIXED_CONTENT_HSTS 717 718 images: 719 type: labeled_counter 720 description: > 721 How often image loads fail in regular mode and in upgrading mode? 722 723 This metric was generated to correspond to the Legacy Telemetry 724 categorical histogram MIXED_CONTENT_IMAGES. 725 labels: 726 - ImgUpSuccess 727 - ImgUpFailure 728 - ImgNoUpSuccess 729 - ImgNoUpFailure 730 bugs: 731 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 732 data_reviews: 733 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 734 notification_emails: 735 - seceng-telemetry@mozilla.com 736 expires: never 737 telemetry_mirror: h#MIXED_CONTENT_IMAGES 738 739 video: 740 type: labeled_counter 741 description: > 742 How often video loads fail in regular mode and in upgrading mode? 743 744 This metric was generated to correspond to the Legacy Telemetry 745 categorical histogram MIXED_CONTENT_VIDEO. 746 labels: 747 - VideoUpSuccess 748 - VideoUpFailure 749 - VideoNoUpSuccess 750 - VideoNoUpFailure 751 bugs: 752 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 753 data_reviews: 754 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 755 notification_emails: 756 - seceng-telemetry@mozilla.com 757 expires: never 758 telemetry_mirror: h#MIXED_CONTENT_VIDEO 759 760 audio: 761 type: labeled_counter 762 description: > 763 How often audio loads fail in regular mode and in upgrading mode? 764 765 This metric was generated to correspond to the Legacy Telemetry 766 categorical histogram MIXED_CONTENT_AUDIO. 767 labels: 768 - AudioUpSuccess 769 - AudioUpFailure 770 - AudioNoUpSuccess 771 - AudioNoUpFailure 772 bugs: 773 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 774 data_reviews: 775 - https://bugzilla.mozilla.org/show_bug.cgi?id=1819336 776 notification_emails: 777 - seceng-telemetry@mozilla.com 778 expires: never 779 telemetry_mirror: h#MIXED_CONTENT_AUDIO 780 781 security.ui: 782 events: 783 type: custom_distribution 784 description: > 785 Security-related UI events (addons, form submission, TLS certs, Safe 786 Browsing, updates and geolocation). See 787 /security/manager/ssl/nsISecurityUITelemetry.idl for the specific values. 788 789 This metric was generated to correspond to the Legacy Telemetry enumerated 790 histogram SECURITY_UI. 791 range_min: 0 792 range_max: 100 793 bucket_count: 101 794 histogram_type: linear 795 bugs: 796 - https://bugzilla.mozilla.org/show_bug.cgi?id=767676 797 data_reviews: 798 - https://bugzilla.mozilla.org/show_bug.cgi?id=767676 799 notification_emails: 800 - seceng-telemetry@mozilla.com 801 - fxprivacyandsecurity@mozilla.com 802 expires: never 803 telemetry_mirror: SECURITY_UI