| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| index 85aa6a8da9cffb913e81560bf720981d6c173b6e..c0b08ff60fb9a48675ca345b1ee8d4f3f15516e5 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| @@ -347,7 +347,7 @@ void ContentSecurityPolicy::AddPolicyFromHeaderValue(
|
| policies_.push_back(policy.Release());
|
|
|
| // Skip the comma, and begin the next header from the current position.
|
| - ASSERT(position == end || *position == ',');
|
| + DCHECK(position == end || *position == ',');
|
| skipExactly<UChar>(position, end, ',');
|
| begin = position;
|
| }
|
| @@ -1174,7 +1174,7 @@ void ContentSecurityPolicy::ReportViolation(
|
| RedirectStatus redirect_status,
|
| Element* element,
|
| const String& source) {
|
| - ASSERT(violation_type == kURLViolation || blocked_url.IsEmpty());
|
| + DCHECK(violation_type == kURLViolation || blocked_url.IsEmpty());
|
|
|
| // TODO(lukasza): Support sending reports from OOPIFs -
|
| // https://crbug.com/611232 (or move CSP child-src and frame-src checks to the
|
| @@ -1473,7 +1473,7 @@ void ContentSecurityPolicy::ReportInvalidPathCharacter(
|
| const String& directive_name,
|
| const String& value,
|
| const char invalid_char) {
|
| - ASSERT(invalid_char == '#' || invalid_char == '?');
|
| + DCHECK(invalid_char == '#' || invalid_char == '?');
|
|
|
| String ignoring =
|
| "The fragment identifier, including the '#', will be ignored.";
|
|
|