| Index: components/certificate_transparency/ct_policy_manager.cc
|
| diff --git a/components/certificate_transparency/ct_policy_manager.cc b/components/certificate_transparency/ct_policy_manager.cc
|
| index 445f3d204a7f4c569b99f7ff3cb8fbbf87b8d477..833014cf817b41fbbced59bd87d9a9ea81ad3c3b 100644
|
| --- a/components/certificate_transparency/ct_policy_manager.cc
|
| +++ b/components/certificate_transparency/ct_policy_manager.cc
|
| @@ -89,7 +89,7 @@ void CTPolicyManager::CTDelegate::UpdateFromPrefs(
|
|
|
| net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel
|
| CTPolicyManager::CTDelegate::IsCTRequiredForHost(const std::string& hostname) {
|
| - DCHECK(network_task_runner_->RunsTasksOnCurrentThread());
|
| + DCHECK(network_task_runner_->RunsTasksInCurrentSequence());
|
|
|
| // Scheme and port are ignored by the policy, so it's OK to construct a
|
| // new GURL here. However, |hostname| is in network form, not URL form,
|
| @@ -125,7 +125,7 @@ CTPolicyManager::CTDelegate::IsCTRequiredForHost(const std::string& hostname) {
|
|
|
| void CTPolicyManager::CTDelegate::Update(base::ListValue* required_hosts,
|
| base::ListValue* excluded_hosts) {
|
| - DCHECK(network_task_runner_->RunsTasksOnCurrentThread());
|
| + DCHECK(network_task_runner_->RunsTasksInCurrentSequence());
|
|
|
| url_matcher_.reset(new url_matcher::URLMatcher);
|
| filters_.clear();
|
|
|