1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
|
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifdef UNSAFE_BUFFERS_BUILD
// TODO(crbug.com/40285824): Remove this and convert code to safer constructs.
#pragma allow_unsafe_buffers
#endif
#include "chrome/browser/ash/cert_provisioning/cert_provisioning_metrics.h"
#include "base/metrics/histogram_functions.h"
#include "base/notreached.h"
#include "chrome/browser/ash/cert_provisioning/cert_provisioning_common.h"
#include "components/policy/core/common/cloud/cloud_policy_constants.h"
namespace ash::cert_provisioning {
#define CP_PREFIX "ChromeOS.CertProvisioning"
#define CP_RESULT ".Result"
#define CP_EVENT ".Event"
#define CP_DYNAMIC ".Dynamic"
#define CP_USER ".User"
#define CP_DEVICE ".Device"
namespace {
// "*.User" should have index 0, "*.Device" should have index 1 (same as values
// of CertScope).
const char* const kResult[][2] = {
{CP_PREFIX CP_RESULT CP_USER, CP_PREFIX CP_RESULT CP_DEVICE},
{CP_PREFIX CP_RESULT CP_DYNAMIC CP_USER,
CP_PREFIX CP_RESULT CP_DYNAMIC CP_DEVICE}};
const char* const kEvent[][2] = {
{CP_PREFIX CP_EVENT CP_USER, CP_PREFIX CP_EVENT CP_DEVICE},
{CP_PREFIX CP_EVENT CP_DYNAMIC CP_USER,
CP_PREFIX CP_EVENT CP_DYNAMIC CP_DEVICE}};
// CertScope has stable indexes because it is also used for serialization.
constexpr int ScopeToIdx(CertScope scope) {
static_assert(static_cast<int>(CertScope::kMaxValue) == 1,
"CertScope was modified, update arrays with metric names");
return static_cast<int>(scope);
}
// CertScope has stable indexes because it is also used for serialization.
constexpr int ProtocolVersionToIdx(ProtocolVersion protocol_version) {
switch (protocol_version) {
case ProtocolVersion::kStatic:
return 0;
case ProtocolVersion::kDynamic:
return 1;
}
}
} // namespace
void RecordResult(ProtocolVersion protocol_version,
CertScope scope,
CertProvisioningWorkerState final_state,
CertProvisioningWorkerState prev_state) {
DCHECK(!IsFinalState(prev_state));
DCHECK(IsFinalState(final_state));
base::UmaHistogramEnumeration(
kResult[ProtocolVersionToIdx(protocol_version)][ScopeToIdx(scope)],
final_state);
if (final_state == CertProvisioningWorkerState::kFailed) {
base::UmaHistogramEnumeration(
kResult[ProtocolVersionToIdx(protocol_version)][ScopeToIdx(scope)],
prev_state);
}
}
void RecordEvent(ProtocolVersion protocol_version,
CertScope scope,
CertProvisioningEvent event) {
base::UmaHistogramEnumeration(
kEvent[ProtocolVersionToIdx(protocol_version)][ScopeToIdx(scope)], event);
}
void RecordDmStatusForDynamic(policy::DeviceManagementStatus status) {
base::UmaHistogramSparse(kDmStatusHistogramName, status);
}
void RecordCertProvBackendErrorForDynamic(
enterprise_management::CertProvBackendError::Error error) {
base::UmaHistogramEnumeration(
kCertProvBackendErrorHistogramName, error,
enterprise_management::CertProvBackendError::Error_MAX);
}
} // namespace ash::cert_provisioning
|