Index: components/certificate_transparency/ct_policy_manager.cc |
diff --git a/components/certificate_transparency/ct_policy_manager.cc b/components/certificate_transparency/ct_policy_manager.cc |
index 445f3d204a7f4c569b99f7ff3cb8fbbf87b8d477..833014cf817b41fbbced59bd87d9a9ea81ad3c3b 100644 |
--- a/components/certificate_transparency/ct_policy_manager.cc |
+++ b/components/certificate_transparency/ct_policy_manager.cc |
@@ -89,7 +89,7 @@ void CTPolicyManager::CTDelegate::UpdateFromPrefs( |
net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel |
CTPolicyManager::CTDelegate::IsCTRequiredForHost(const std::string& hostname) { |
- DCHECK(network_task_runner_->RunsTasksOnCurrentThread()); |
+ DCHECK(network_task_runner_->RunsTasksInCurrentSequence()); |
// Scheme and port are ignored by the policy, so it's OK to construct a |
// new GURL here. However, |hostname| is in network form, not URL form, |
@@ -125,7 +125,7 @@ CTPolicyManager::CTDelegate::IsCTRequiredForHost(const std::string& hostname) { |
void CTPolicyManager::CTDelegate::Update(base::ListValue* required_hosts, |
base::ListValue* excluded_hosts) { |
- DCHECK(network_task_runner_->RunsTasksOnCurrentThread()); |
+ DCHECK(network_task_runner_->RunsTasksInCurrentSequence()); |
url_matcher_.reset(new url_matcher::URLMatcher); |
filters_.clear(); |