Index: webkit/fileapi/file_system_context_unittest.cc |
diff --git a/webkit/fileapi/file_system_context_unittest.cc b/webkit/fileapi/file_system_context_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..9d6fb1044907ead70fa41604dbfeeab1df9b9e1b |
--- /dev/null |
+++ b/webkit/fileapi/file_system_context_unittest.cc |
@@ -0,0 +1,85 @@ |
+// Copyright (c) 2010 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "webkit/fileapi/file_system_context.h" |
+ |
+#include "base/basictypes.h" |
+#include "base/file_path.h" |
+#include "base/logging.h" |
+#include "base/message_loop_proxy.h" |
+#include "base/scoped_ptr.h" |
+#include "base/string_number_conversions.h" |
+#include "googleurl/src/gurl.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+#include "webkit/quota/special_storage_policy.h" |
+ |
+using namespace fileapi; |
+ |
+namespace { |
+ |
+static const char* const kTestOrigins[] = { |
+ "https://a.com/", |
+ "http://b.com/", |
+ "http://c.com:1/", |
+ "file:///", |
+}; |
+ |
+class TestSpecialStoragePolicy : public quota::SpecialStoragePolicy { |
+ public: |
+ virtual bool IsStorageProtected(const GURL& origin) { |
+ return false; |
+ } |
+ |
+ virtual bool IsStorageUnlimited(const GURL& origin) { |
+ return origin == GURL(kTestOrigins[1]); |
+ } |
+}; |
+ |
+scoped_refptr<FileSystemContext> NewFileSystemContext( |
+ bool allow_file_access, |
+ bool unlimited_quota, |
+ scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy) { |
+ return new FileSystemContext(base::MessageLoopProxy::CreateForCurrentThread(), |
+ base::MessageLoopProxy::CreateForCurrentThread(), |
+ special_storage_policy, |
+ FilePath(), false /* is_incognito */, |
+ allow_file_access, unlimited_quota); |
+} |
+ |
+} // anonymous namespace |
+ |
+TEST(FileSystemContextTest, IsStorageUnlimited) { |
+ // Regular cases. |
+ scoped_refptr<FileSystemContext> context( |
+ NewFileSystemContext(false, false, NULL)); |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestOrigins); ++i) { |
+ SCOPED_TRACE(testing::Message() << "IsStorageUnlimited w/o policy #" |
+ << i << " " << kTestOrigins[i]); |
+ EXPECT_FALSE(context->IsStorageUnlimited(GURL(kTestOrigins[i]))); |
+ } |
+ |
+ // With allow_file_access=true cases. |
+ context = NewFileSystemContext(true, false, NULL); |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestOrigins); ++i) { |
+ GURL origin(kTestOrigins[i]); |
+ EXPECT_EQ(origin.SchemeIsFile(), context->IsStorageUnlimited(origin)); |
+ } |
+ |
+ // With unlimited_quota=true cases. |
+ context = NewFileSystemContext(false, true, NULL); |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestOrigins); ++i) { |
+ EXPECT_TRUE(context->IsStorageUnlimited(GURL(kTestOrigins[i]))); |
+ } |
+ |
+ // With SpecialStoragePolicy. |
+ scoped_refptr<TestSpecialStoragePolicy> policy(new TestSpecialStoragePolicy); |
+ context = NewFileSystemContext(false, false, policy); |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestOrigins); ++i) { |
+ SCOPED_TRACE(testing::Message() << "IsStorageUnlimited /w policy #" |
+ << i << " " << kTestOrigins[i]); |
+ GURL origin(kTestOrigins[i]); |
+ EXPECT_EQ(policy->IsStorageUnlimited(origin), |
+ context->IsStorageUnlimited(origin)); |
+ } |
+} |