Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index 4f223e5c8333c3471de00b90643961173537cf1f..b951e3f3ae7ae3646ecf05b6308f4a55ea6ed619 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -1414,11 +1414,11 @@ class LocalHttpTestServer : public TestServer { |
explicit LocalHttpTestServer(const base::FilePath& document_root) |
: TestServer(TestServer::TYPE_HTTP, |
ScopedCustomUrlRequestTestHttpHost::value(), |
- document_root) {} |
+ GetSourceRelativePath(document_root)) {} |
LocalHttpTestServer() |
: TestServer(TestServer::TYPE_HTTP, |
ScopedCustomUrlRequestTestHttpHost::value(), |
- base::FilePath()) {} |
+ GetSourcePath()) {} |
}; |
TEST_F(URLRequestTest, DelayedCookieCallback) { |
@@ -2949,7 +2949,8 @@ TEST_F(URLRequestTestHTTP, DISABLED_HTTPSToHTTPRedirectNoRefererTest) { |
TestServer https_test_server( |
TestServer::TYPE_HTTPS, TestServer::kLocalhost, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(https_test_server.Start()); |
// An https server is sent a request with an https referer, |
@@ -3393,7 +3394,8 @@ TEST_F(URLRequestTestHTTP, ProcessSTS) { |
TestServer https_test_server( |
TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest"))); |
+ TestServer::GetSourceRelativePath( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")))); |
ASSERT_TRUE(https_test_server.Start()); |
TestDelegate d; |
@@ -3420,7 +3422,8 @@ TEST_F(URLRequestTestHTTP, ProcessSTSOnce) { |
TestServer https_test_server( |
TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest"))); |
+ TestServer::GetSourceRelativePath( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")))); |
ASSERT_TRUE(https_test_server.Start()); |
TestDelegate d; |
@@ -4146,7 +4149,8 @@ class HTTPSRequestTest : public testing::Test { |
TEST_F(HTTPSRequestTest, DISABLED_HTTPSGetTest) { |
TestServer test_server(TestServer::TYPE_HTTPS, |
TestServer::kLocalhost, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
@@ -4173,7 +4177,8 @@ TEST_F(HTTPSRequestTest, HTTPSMismatchedTest) { |
TestServer::SSLOptions::CERT_MISMATCHED_NAME); |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
bool err_allowed = true; |
@@ -4206,7 +4211,8 @@ TEST_F(HTTPSRequestTest, HTTPSExpiredTest) { |
TestServer::SSLOptions::CERT_EXPIRED); |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
// Iterate from false to true, just so that we do the opposite of the |
@@ -4253,7 +4259,8 @@ TEST_F(HTTPSRequestTest, TLSv1Fallback) { |
TestServer::SSLOptions::TLS_INTOLERANT_TLS1_1; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
@@ -4280,7 +4287,8 @@ TEST_F(HTTPSRequestTest, HTTPSPreloadedHSTSTest) { |
TestServer::SSLOptions::CERT_MISMATCHED_NAME); |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
// We require that the URL be www.google.com in order to pick up the |
@@ -4323,7 +4331,8 @@ TEST_F(HTTPSRequestTest, HTTPSErrorsNoClobberTSSTest) { |
TestServer::SSLOptions::CERT_MISMATCHED_NAME); |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
// We require that the URL be www.google.com in order to pick up the |
@@ -4382,7 +4391,8 @@ TEST_F(HTTPSRequestTest, HSTSPreservesPosts) { |
TestServer::SSLOptions ssl_options(TestServer::SSLOptions::CERT_OK); |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
@@ -4432,7 +4442,8 @@ TEST_F(HTTPSRequestTest, SSLv3Fallback) { |
ssl_options.tls_intolerant = TestServer::SSLOptions::TLS_INTOLERANT_ALL; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
@@ -4482,7 +4493,8 @@ TEST_F(HTTPSRequestTest, ClientAuthTest) { |
ssl_options.request_client_certificate = true; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
SSLClientAuthTestDelegate d; |
@@ -4518,7 +4530,8 @@ TEST_F(HTTPSRequestTest, ResumeTest) { |
ssl_options.record_resume = true; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
SSLClientSocket::ClearSessionCache(); |
@@ -4586,7 +4599,8 @@ TEST_F(HTTPSRequestTest, SSLSessionCacheShardTest) { |
ssl_options.record_resume = true; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
SSLClientSocket::ClearSessionCache(); |
@@ -4722,7 +4736,8 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
*out_cert_status = 0; |
TestServer test_server(TestServer::TYPE_HTTPS, |
ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ TestServer::GetSourceRelativePath(base::FilePath( |
+ FILE_PATH_LITERAL("net/data/ssl")))); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
@@ -5016,7 +5031,7 @@ class URLRequestTestFTP : public URLRequestTest { |
public: |
URLRequestTestFTP() |
: test_server_(TestServer::TYPE_FTP, TestServer::kLocalhost, |
- base::FilePath()) { |
+ TestServer::GetSourcePath()) { |
} |
protected: |