This case can come up with same-compartment realms. Keeping these CCWs
would confuse RemapWrapper because it'd be called with the CCW and target
in the same compartment.
Differential Revision: https://phabricator.services.mozilla.com/D15491
--HG--
extra : moz-landing-system : lando
Makes the following changes:
* The WindowProxy optimizations in the ICs and Ion now guard the WindowProxy's
global is the script's global. Other WindowProxies are harder to optimize
because of potential security checks based on document.domain.
* IsWindowProxyForScriptGlobal was added as helper function to consolidate the
logic for this.
* Removes the WindowProxy optimization for CCWs. This becomes more complicated
in the new world for various reasons and it seems better to focus on
getting same-compartment realms working to address that use case.
Differential Revision: https://phabricator.services.mozilla.com/D15492
--HG--
extra : moz-landing-system : lando
The clamping is intended to be a safeguard against extreme values in the
meta viewport tag. If the layout viewport is sized to the display size,
avoid the clamping, since the display size could legitimately be small
(e.g. in Android 8's picture-in-picture mode).
Differential Revision: https://phabricator.services.mozilla.com/D15605
--HG--
extra : moz-landing-system : lando
There's no guarantee a backend exists when a MediaManager does, and
crash-stats shows that shutdown can occur between posting a task and running
it, making it illegal to create a backend anew.
We're safer off avoiding creating a new backend. The cleanup step we're trying
to do is only effective if a backend already exists anyway.
Differential Revision: https://phabricator.services.mozilla.com/D15631
--HG--
extra : moz-landing-system : lando
In test code (which is where this codepath is mostly exercised), the
controller should never be null here. However this codepath is sadly
also used in production code on Android, and there we might experience a
page navigation or a similarly destructive action while the flush is
inflight. That can result in a null pointer dereference.
Differential Revision: https://phabricator.services.mozilla.com/D15597
--HG--
extra : moz-landing-system : lando
Enough linux-based systems don't have libsecret that we can't make it a
requirement on linux. For those that do, however, we can dynamically load the
library at runtime. For those that don't, we can fall back to NSS.
Differential Revision: https://phabricator.services.mozilla.com/D9969
--HG--
extra : moz-landing-system : lando
These tests have always been skipped silently. Now that https tests are
enabled to actually run, we find that some (all?) actually fail on Android:
now explicitly skipped to allow for green runs of tier 1 suites.