Index: third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
diff --git a/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp b/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
index fa70965ee18c4993ae4226e3655c94be4ed3e193..af5abf1f59c110153e9a5e4cc0eea1cb5a8096c1 100644 |
--- a/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
+++ b/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
@@ -193,7 +193,7 @@ PassRefPtr<SecurityOrigin> SecurityOrigin::Create(const KURL& url) { |
PassRefPtr<SecurityOrigin> SecurityOrigin::CreateUnique() { |
RefPtr<SecurityOrigin> origin = AdoptRef(new SecurityOrigin()); |
- ASSERT(origin->IsUnique()); |
+ DCHECK(origin->IsUnique()); |
return origin.Release(); |
} |
@@ -369,7 +369,7 @@ void SecurityOrigin::GrantUniversalAccess() { |
} |
void SecurityOrigin::AddSuborigin(const Suborigin& suborigin) { |
- ASSERT(RuntimeEnabledFeatures::suboriginsEnabled()); |
+ DCHECK(RuntimeEnabledFeatures::suboriginsEnabled()); |
// Changing suborigins midstream is bad. Very bad. It should not happen. |
// This is, in fact, one of the very basic invariants that makes |
// suborigins an effective security tool. |
@@ -379,7 +379,7 @@ void SecurityOrigin::AddSuborigin(const Suborigin& suborigin) { |
} |
void SecurityOrigin::BlockLocalAccessFromLocalOrigin() { |
- ASSERT(IsLocal()); |
+ DCHECK(IsLocal()); |
block_local_access_from_local_origin_ = true; |
} |
@@ -575,7 +575,7 @@ bool SecurityOrigin::AreSameSchemeHostPort(const KURL& a, const KURL& b) { |
} |
const KURL& SecurityOrigin::UrlWithUniqueSecurityOrigin() { |
- ASSERT(IsMainThread()); |
+ DCHECK(IsMainThread()); |
DEFINE_STATIC_LOCAL(const KURL, unique_security_origin_url, |
(kParsedURLString, "data:,")); |
return unique_security_origin_url; |