Index: components/safe_browsing_db/v4_local_database_manager.cc |
diff --git a/components/safe_browsing_db/v4_local_database_manager.cc b/components/safe_browsing_db/v4_local_database_manager.cc |
index ce0831247ec8a796607415a0af839678f6ba3522..45748e4601eec7353fc74d4d88140c1aaccc994e 100644 |
--- a/components/safe_browsing_db/v4_local_database_manager.cc |
+++ b/components/safe_browsing_db/v4_local_database_manager.cc |
@@ -81,13 +81,15 @@ ThreatSeverity GetThreatSeverity(const ListIdentifier& list_id) { |
switch (list_id.threat_type()) { |
case MALWARE_THREAT: |
case SOCIAL_ENGINEERING_PUBLIC: |
+ case MALICIOUS_BINARY: |
return 0; |
case UNWANTED_SOFTWARE: |
return 1; |
case API_ABUSE: |
return 2; |
default: |
- NOTREACHED() << "Unexpected ThreatType encountered in GetThreatSeverity"; |
+ NOTREACHED() << "Unexpected ThreatType encountered: " |
+ << list_id.threat_type(); |
return kLeastSeverity; |
} |
} |
@@ -435,6 +437,7 @@ bool V4LocalDatabaseManager::GetPrefixMatches( |
const base::TimeTicks before = TimeTicks::Now(); |
if (check->client_callback_type == ClientCallbackType::CHECK_BROWSE_URL || |
check->client_callback_type == ClientCallbackType::CHECK_DOWNLOAD_URLS || |
+ check->client_callback_type == ClientCallbackType::CHECK_RESOURCE_URL || |
check->client_callback_type == ClientCallbackType::CHECK_EXTENSION_IDS || |
check->client_callback_type == ClientCallbackType::CHECK_OTHER) { |
DCHECK(!check->full_hashes.empty()); |
@@ -450,7 +453,7 @@ bool V4LocalDatabaseManager::GetPrefixMatches( |
} |
} |
} else { |
- NOTREACHED() << "Unexpected client_callback_type encountered"; |
+ NOTREACHED() << "Unexpected client_callback_type encountered."; |
} |
// TODO(vakh): Only log SafeBrowsing.V4GetPrefixMatches.Time once PVer3 code |