/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "ContentBlockingLog.h" #include "mozilla/RandomNum.h" #include "mozilla/Telemetry.h" #include "mozilla/XorShift128PlusRNG.h" namespace mozilla { namespace dom { // randomly choose 1% users included in the content blocking measurement // based on their client id. static constexpr double kRatioReportUser = 0.01; // randomly choose 0.14% documents when the page is unload. static constexpr double kRatioReportDocument = 0.0014; static bool IsReportingPerUserEnabled() { MOZ_ASSERT(NS_IsMainThread()); static Maybe sIsReportingEnabled; if (sIsReportingEnabled.isSome()) { return sIsReportingEnabled.value(); } nsAutoCString cachedClientId; if (NS_FAILED(Preferences::GetCString("toolkit.telemetry.cachedClientID", cachedClientId))) { return false; } nsID clientId; if (!clientId.Parse(cachedClientId.get())) { return false; } /** * UUID might not be uniform-distributed (although some part of it could be). * In order to generate more random result, usually we use a hash function, * but here we hope it's fast and doesn't have to be cryptographic-safe. * |XorShift128PlusRNG| looks like a good alternative because it takes a * 128-bit data as its seed and always generate identical sequence if the * initial seed is the same. */ static_assert(sizeof(nsID) == 16, "nsID is 128-bit"); uint64_t* init = reinterpret_cast(&clientId); non_crypto::XorShift128PlusRNG rng(init[0], init[1]); sIsReportingEnabled.emplace(rng.nextDouble() <= kRatioReportUser); return sIsReportingEnabled.value(); } static bool IsReportingPerDocumentEnabled() { constexpr double boundary = kRatioReportDocument * std::numeric_limits::max(); Maybe randomNum = RandomUint64(); return randomNum.isSome() && randomNum.value() <= boundary; } static bool IsReportingEnabled() { if (StaticPrefs::telemetry_origin_telemetry_test_mode_enabled()) { return true; } else if (!StaticPrefs:: privacy_trackingprotection_origin_telemetry_enabled()) { return false; } return IsReportingPerUserEnabled() && IsReportingPerDocumentEnabled(); } void ContentBlockingLog::ReportLog() { MOZ_ASSERT(NS_IsMainThread()); if (!IsReportingEnabled()) { return; } for (const auto& originEntry : mLog) { if (!originEntry.mData) { continue; } for (const auto& logEntry : Reversed(originEntry.mData->mLogs)) { if (logEntry.mType != nsIWebProgressListener::STATE_COOKIES_BLOCKED_TRACKER) { continue; } const bool isBlocked = logEntry.mBlocked; Maybe reason = logEntry.mReason; const bool testMode = StaticPrefs::telemetry_origin_telemetry_test_mode_enabled(); using OriginMetricID = Telemetry::OriginMetricID; OriginMetricID metricId = testMode ? OriginMetricID::ContentBlocking_Blocked_TestOnly : OriginMetricID::ContentBlocking_Blocked; if (!isBlocked) { MOZ_ASSERT(reason.isSome()); switch (reason.value()) { case StorageAccessGrantedReason::eStorageAccessAPI: metricId = testMode ? OriginMetricID:: ContentBlocking_StorageAccessAPIExempt_TestOnly : OriginMetricID::ContentBlocking_StorageAccessAPIExempt; break; case StorageAccessGrantedReason::eOpenerAfterUserInteraction: metricId = testMode ? OriginMetricID:: ContentBlocking_OpenerAfterUserInteractionExempt_TestOnly : OriginMetricID:: ContentBlocking_OpenerAfterUserInteractionExempt; break; case StorageAccessGrantedReason::eOpener: metricId = testMode ? OriginMetricID::ContentBlocking_OpenerExempt_TestOnly : OriginMetricID::ContentBlocking_OpenerExempt; break; default: MOZ_ASSERT_UNREACHABLE("Unknown StorageAccessGrantedReason"); } } Telemetry::RecordOrigin(metricId, originEntry.mOrigin); break; } } } } // namespace dom } // namespace mozilla