Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(10)

Side by Side Diff: webkit/fileapi/file_system_mount_point_provider_unittest.cc

Issue 9109036: Mark some FileSystemMountPointProviderTest tests as FAILS_ on ChromeOS. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 8 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <set> 5 #include <set>
6 #include <string> 6 #include <string>
7 7
8 #include "base/basictypes.h" 8 #include "base/basictypes.h"
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/file_util.h" 10 #include "base/file_util.h"
(...skipping 343 matching lines...) Expand 10 before | Expand all | Expand 10 after
354 kFileSystemTypeTemporary, true, &root_path1)); 354 kFileSystemTypeTemporary, true, &root_path1));
355 355
356 SetupNewContext(CreateDisallowFileAccessOptions()); 356 SetupNewContext(CreateDisallowFileAccessOptions());
357 FilePath root_path2; 357 FilePath root_path2;
358 EXPECT_TRUE(GetRootPath(origin_url, 358 EXPECT_TRUE(GetRootPath(origin_url,
359 kFileSystemTypeTemporary, false, &root_path2)); 359 kFileSystemTypeTemporary, false, &root_path2));
360 360
361 EXPECT_EQ(root_path1.value(), root_path2.value()); 361 EXPECT_EQ(root_path1.value(), root_path2.value());
362 } 362 }
363 363
364 TEST_F(FileSystemMountPointProviderTest, GetRootPathGetWithoutCreate) { 364 // http://crbug.com/109342
365 #if defined(OS_CHROMEOS)
366 #define MAYBE_GetRootPathGetWithoutCreate FAILS_GetRootPathGetWithoutCreate
367 #else
368 #define MAYBE_GetRootPathGetWithoutCreate GetRootPathGetWithoutCreate
369 #endif
370 TEST_F(FileSystemMountPointProviderTest, MAYBE_GetRootPathGetWithoutCreate) {
365 SetupNewContext(CreateDisallowFileAccessOptions()); 371 SetupNewContext(CreateDisallowFileAccessOptions());
366 372
367 // Try to get a root directory without creating. 373 // Try to get a root directory without creating.
368 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { 374 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
369 SCOPED_TRACE(testing::Message() << "RootPath (create=false) #" << i << " " 375 SCOPED_TRACE(testing::Message() << "RootPath (create=false) #" << i << " "
370 << kRootPathTestCases[i].expected_path); 376 << kRootPathTestCases[i].expected_path);
371 EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), 377 EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
372 kRootPathTestCases[i].type, 378 kRootPathTestCases[i].type,
373 false /* create */, NULL)); 379 false /* create */, NULL));
374 } 380 }
375 } 381 }
376 382
377 TEST_F(FileSystemMountPointProviderTest, GetRootPathInIncognito) { 383 // http://crbug.com/109342
384 #if defined(OS_CHROMEOS)
385 #define MAYBE_GetRootPathInIncognito FAILS_GetRootPathInIncognito
386 #else
387 #define MAYBE_GetRootPathInIncognito GetRootPathInIncognito
388 #endif
389 TEST_F(FileSystemMountPointProviderTest, MAYBE_GetRootPathInIncognito) {
378 SetupNewContext(CreateIncognitoFileSystemOptions()); 390 SetupNewContext(CreateIncognitoFileSystemOptions());
379 391
380 // Try to get a root directory. 392 // Try to get a root directory.
381 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { 393 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
382 SCOPED_TRACE(testing::Message() << "RootPath (incognito) #" << i << " " 394 SCOPED_TRACE(testing::Message() << "RootPath (incognito) #" << i << " "
383 << kRootPathTestCases[i].expected_path); 395 << kRootPathTestCases[i].expected_path);
384 EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), 396 EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
385 kRootPathTestCases[i].type, 397 kRootPathTestCases[i].type,
386 true /* create */, NULL)); 398 true /* create */, NULL));
387 } 399 }
388 } 400 }
389 401
390 TEST_F(FileSystemMountPointProviderTest, GetRootPathFileURI) { 402 // http://crbug.com/109342
403 #if defined(OS_CHROMEOS)
404 #define MAYBE_GetRootPathFileURI FAILS_GetRootPathFileURI
405 #else
406 #define MAYBE_GetRootPathFileURI GetRootPathFileURI
407 #endif
408 TEST_F(FileSystemMountPointProviderTest, MAYBE_GetRootPathFileURI) {
391 SetupNewContext(CreateDisallowFileAccessOptions()); 409 SetupNewContext(CreateDisallowFileAccessOptions());
392 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) { 410 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) {
393 SCOPED_TRACE(testing::Message() << "RootPathFileURI (disallow) #" 411 SCOPED_TRACE(testing::Message() << "RootPathFileURI (disallow) #"
394 << i << " " << kRootPathFileURITestCases[i].expected_path); 412 << i << " " << kRootPathFileURITestCases[i].expected_path);
395 EXPECT_FALSE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url), 413 EXPECT_FALSE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url),
396 kRootPathFileURITestCases[i].type, 414 kRootPathFileURITestCases[i].type,
397 true /* create */, NULL)); 415 true /* create */, NULL));
398 } 416 }
399 } 417 }
400 418
401 TEST_F(FileSystemMountPointProviderTest, GetRootPathFileURIWithAllowFlag) { 419 // http://crbug.com/109342
420 #if defined(OS_CHROMEOS)
421 #define MAYBE_GetRootPathFileURIWithAllowFlag \
422 FAILS_GetRootPathFileURIWithAllowFlag
423 #else
424 #define MAYBE_GetRootPathFileURIWithAllowFlag GetRootPathFileURIWithAllowFlag
425 #endif
426 TEST_F(FileSystemMountPointProviderTest,
427 MAYBE_GetRootPathFileURIWithAllowFlag) {
402 SetupNewContext(CreateRootPathTestOptions()); 428 SetupNewContext(CreateRootPathTestOptions());
403 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) { 429 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) {
404 SCOPED_TRACE(testing::Message() << "RootPathFileURI (allow) #" 430 SCOPED_TRACE(testing::Message() << "RootPathFileURI (allow) #"
405 << i << " " << kRootPathFileURITestCases[i].expected_path); 431 << i << " " << kRootPathFileURITestCases[i].expected_path);
406 FilePath root_path; 432 FilePath root_path;
407 EXPECT_TRUE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url), 433 EXPECT_TRUE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url),
408 kRootPathFileURITestCases[i].type, 434 kRootPathFileURITestCases[i].type,
409 true /* create */, &root_path)); 435 true /* create */, &root_path));
410 if (kRootPathFileURITestCases[i].type != fileapi::kFileSystemTypeExternal) { 436 if (kRootPathFileURITestCases[i].type != fileapi::kFileSystemTypeExternal) {
411 FilePath expected = file_system_path().AppendASCII( 437 FilePath expected = file_system_path().AppendASCII(
(...skipping 11 matching lines...) Expand all
423 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kIsRestrictedNameTestCases); ++i) { 449 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kIsRestrictedNameTestCases); ++i) {
424 SCOPED_TRACE(testing::Message() << "IsRestrictedName #" << i << " " 450 SCOPED_TRACE(testing::Message() << "IsRestrictedName #" << i << " "
425 << kIsRestrictedNameTestCases[i].name); 451 << kIsRestrictedNameTestCases[i].name);
426 FilePath name(kIsRestrictedNameTestCases[i].name); 452 FilePath name(kIsRestrictedNameTestCases[i].name);
427 EXPECT_EQ(kIsRestrictedNameTestCases[i].expected_dangerous, 453 EXPECT_EQ(kIsRestrictedNameTestCases[i].expected_dangerous,
428 provider(kFileSystemTypeTemporary)->IsRestrictedFileName(name)); 454 provider(kFileSystemTypeTemporary)->IsRestrictedFileName(name));
429 } 455 }
430 } 456 }
431 457
432 } // namespace fileapi 458 } // namespace fileapi
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698