--- src/content/browser/first_party_sets/first_party_set_parser.cc.old 2022-11-30 11:28:02.726199100 +0100 +++ src/content/browser/first_party_sets/first_party_set_parser.cc 2022-12-01 06:53:17.058993800 +0100 @@ -182,7 +182,7 @@ ParseSiteAndValidate(item, set_entries, elements, emit_errors); if (!alias_or_error.has_value()) { return base::unexpected( - ParseError(alias_or_error.error(), {kCCTLDsField, site, i})); + ParseError(alias_or_error.error(), {kCCTLDsField, site, static_cast(i)})); } const net::SchemefulSite alias = alias_or_error.value(); @@ -195,7 +195,7 @@ if (warnings) { warnings->push_back( ParseWarning(ParseWarningType::kAliasNotCctldVariant, - {kCCTLDsField, site, i})); + {kCCTLDsField, site, static_cast(i)})); } continue; } @@ -230,7 +230,7 @@ base::expected site_or_error = ParseSiteAndValidate(item, set_entries, other_sets_sites, emit_errors); if (!site_or_error.has_value()) - return ParseError(site_or_error.error(), {descriptor.field_name, index}); + return ParseError(site_or_error.error(), {descriptor.field_name, static_cast(index)}); if (exempt_from_limits || !descriptor.size_limit.has_value() || static_cast(index) < descriptor.size_limit.value()) { set_entries.emplace_back(