| Index: webkit/fileapi/file_system_context_unittest.cc
|
| diff --git a/webkit/fileapi/file_system_context_unittest.cc b/webkit/fileapi/file_system_context_unittest.cc
|
| index 515563689161aa51e7fbcfbc4883af2c2cda504d..0c135014cdaaf26e5b2b0de974b00542770a7ea4 100644
|
| --- a/webkit/fileapi/file_system_context_unittest.cc
|
| +++ b/webkit/fileapi/file_system_context_unittest.cc
|
| @@ -28,7 +28,7 @@ namespace fileapi {
|
| namespace {
|
|
|
| const char kTestOrigin[] = "http://chromium.org/";
|
| -const FilePath::CharType kVirtualPathNoRoot[] = FPL("root/file");
|
| +const base::FilePath::CharType kVirtualPathNoRoot[] = FPL("root/file");
|
|
|
| GURL CreateRawFileSystemURL(const std::string& type_str,
|
| const std::string& fs_id) {
|
| @@ -73,8 +73,8 @@ class FileSystemContextTest : public testing::Test {
|
| const GURL& expect_origin,
|
| FileSystemType expect_mount_type,
|
| FileSystemType expect_type,
|
| - const FilePath& expect_path,
|
| - const FilePath& expect_virtual_path,
|
| + const base::FilePath& expect_path,
|
| + const base::FilePath& expect_virtual_path,
|
| const std::string& expect_filesystem_id) {
|
| EXPECT_TRUE(url.is_valid());
|
|
|
| @@ -105,13 +105,13 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| std::string isolated_id =
|
| IsolatedContext::GetInstance()->RegisterFileSystemForPath(
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/isolated/root")),
|
| + base::FilePath(DRIVE FPL("/test/isolated/root")),
|
| &isolated_name);
|
| // Register system external mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "system",
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/sys/"))));
|
| + base::FilePath(DRIVE FPL("/test/sys/"))));
|
|
|
| FileSystemURL cracked_isolated = file_system_context->CrackURL(
|
| CreateRawFileSystemURL("isolated", isolated_id));
|
| @@ -121,8 +121,8 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| GURL(kTestOrigin),
|
| kFileSystemTypeIsolated,
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/isolated/root/file")).NormalizePathSeparators(),
|
| - FilePath::FromUTF8Unsafe(isolated_id).Append(FPL("root/file")).
|
| + base::FilePath(DRIVE FPL("/test/isolated/root/file")).NormalizePathSeparators(),
|
| + base::FilePath::FromUTF8Unsafe(isolated_id).Append(FPL("root/file")).
|
| NormalizePathSeparators(),
|
| isolated_id);
|
|
|
| @@ -134,8 +134,8 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| GURL(kTestOrigin),
|
| kFileSystemTypeExternal,
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| - FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| + base::FilePath(DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| + base::FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| "system");
|
|
|
|
|
| @@ -152,7 +152,7 @@ TEST_F(FileSystemContextTest, FileSystemContextKeepsMountPointsAlive) {
|
| ASSERT_TRUE(mount_points->RegisterFileSystem(
|
| "system",
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/sys/"))));
|
| + base::FilePath(DRIVE FPL("/test/sys/"))));
|
|
|
| scoped_refptr<FileSystemContext> file_system_context(
|
| CreateFileSystemContextForTest(mount_points.get()));
|
| @@ -170,8 +170,8 @@ TEST_F(FileSystemContextTest, FileSystemContextKeepsMountPointsAlive) {
|
| GURL(kTestOrigin),
|
| kFileSystemTypeExternal,
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| - FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| + base::FilePath(DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| + base::FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| "system");
|
|
|
| // No need to revoke the registered filesystem since |mount_points| lifetime
|
| @@ -189,32 +189,32 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| const std::string kIsolatedFileSystemID =
|
| IsolatedContext::GetInstance()->RegisterFileSystemForPath(
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/isolated/root")),
|
| + base::FilePath(DRIVE FPL("/test/isolated/root")),
|
| &isolated_file_system_name);
|
| // Register system external mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "system",
|
| kFileSystemTypeDrive,
|
| - FilePath(DRIVE FPL("/test/sys/"))));
|
| + base::FilePath(DRIVE FPL("/test/sys/"))));
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "ext",
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/ext"))));
|
| + base::FilePath(DRIVE FPL("/test/ext"))));
|
| // Register a system external mount point with the same name/id as the
|
| // registered isolated mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| kIsolatedFileSystemID,
|
| kFileSystemTypeRestrictedNativeLocal,
|
| - FilePath(DRIVE FPL("/test/system/isolated"))));
|
| + base::FilePath(DRIVE FPL("/test/system/isolated"))));
|
| // Add a mount points with the same name as a system mount point to
|
| // FileSystemContext's external mount points.
|
| ASSERT_TRUE(external_mount_points->RegisterFileSystem(
|
| "ext",
|
| kFileSystemTypeNativeLocal,
|
| - FilePath(DRIVE FPL("/test/local/ext/"))));
|
| + base::FilePath(DRIVE FPL("/test/local/ext/"))));
|
|
|
| const GURL kTestOrigin = GURL("http://chromium.org/");
|
| - const FilePath kVirtualPathNoRoot = FilePath(FPL("root/file"));
|
| + const base::FilePath kVirtualPathNoRoot = base::FilePath(FPL("root/file"));
|
|
|
| struct TestCase {
|
| // Test case values.
|
| @@ -225,7 +225,7 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| bool expect_is_valid;
|
| FileSystemType expect_mount_type;
|
| FileSystemType expect_type;
|
| - const FilePath::CharType* expect_path;
|
| + const base::FilePath::CharType* expect_path;
|
| bool expect_virtual_path_empty;
|
| std::string expect_filesystem_id;
|
| };
|
| @@ -290,8 +290,8 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| };
|
|
|
| for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) {
|
| - const FilePath virtual_path =
|
| - FilePath::FromUTF8Unsafe(kTestCases[i].root).Append(kVirtualPathNoRoot);
|
| + const base::FilePath virtual_path =
|
| + base::FilePath::FromUTF8Unsafe(kTestCases[i].root).Append(kVirtualPathNoRoot);
|
|
|
| GURL raw_url =
|
| CreateRawFileSystemURL(kTestCases[i].type_str, kTestCases[i].root);
|
| @@ -309,14 +309,14 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| GURL(kTestOrigin),
|
| kTestCases[i].expect_mount_type,
|
| kTestCases[i].expect_type,
|
| - FilePath(kTestCases[i].expect_path).NormalizePathSeparators(),
|
| + base::FilePath(kTestCases[i].expect_path).NormalizePathSeparators(),
|
| kTestCases[i].expect_virtual_path_empty ?
|
| - FilePath() : virtual_path.NormalizePathSeparators(),
|
| + base::FilePath() : virtual_path.NormalizePathSeparators(),
|
| kTestCases[i].expect_filesystem_id);
|
| }
|
|
|
| IsolatedContext::GetInstance()->RevokeFileSystemByPath(
|
| - FilePath(DRIVE FPL("/test/isolated/root")));
|
| + base::FilePath(DRIVE FPL("/test/isolated/root")));
|
| ExternalMountPoints::GetSystemInstance()->RevokeFileSystem("system");
|
| ExternalMountPoints::GetSystemInstance()->RevokeFileSystem("ext");
|
| ExternalMountPoints::GetSystemInstance()->RevokeFileSystem(
|
|
|