| Index: content/browser/fileapi/file_system_context_unittest.cc
|
| diff --git a/content/browser/fileapi/file_system_context_unittest.cc b/content/browser/fileapi/file_system_context_unittest.cc
|
| index 43003ad0dc40cfe3b4d09f185208c37dd4815cb4..f989ed791eeb7c201b8195f2a62a00948266abf0 100644
|
| --- a/content/browser/fileapi/file_system_context_unittest.cc
|
| +++ b/content/browser/fileapi/file_system_context_unittest.cc
|
| @@ -23,7 +23,15 @@
|
| #define DRIVE
|
| #endif
|
|
|
| -namespace fileapi {
|
| +using fileapi::ExternalMountPoints;
|
| +using fileapi::FileSystemBackend;
|
| +using fileapi::FileSystemContext;
|
| +using fileapi::FileSystemMountOption;
|
| +using fileapi::FileSystemType;
|
| +using fileapi::FileSystemURL;
|
| +using fileapi::IsolatedContext;
|
| +
|
| +namespace content {
|
|
|
| namespace {
|
|
|
| @@ -57,7 +65,7 @@ class FileSystemContextTest : public testing::Test {
|
|
|
| protected:
|
| FileSystemContext* CreateFileSystemContextForTest(
|
| - ExternalMountPoints* external_mount_points) {
|
| + fileapi::ExternalMountPoints* external_mount_points) {
|
| return new FileSystemContext(base::MessageLoopProxy::current().get(),
|
| base::MessageLoopProxy::current().get(),
|
| external_mount_points,
|
| @@ -104,13 +112,13 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| std::string isolated_name = "root";
|
| std::string isolated_id =
|
| IsolatedContext::GetInstance()->RegisterFileSystemForPath(
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(DRIVE FPL("/test/isolated/root")),
|
| &isolated_name);
|
| // Register system external mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "system",
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/sys/"))));
|
|
|
| @@ -120,8 +128,8 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| ExpectFileSystemURLMatches(
|
| cracked_isolated,
|
| GURL(kTestOrigin),
|
| - kFileSystemTypeIsolated,
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeIsolated,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(
|
| DRIVE FPL("/test/isolated/root/file")).NormalizePathSeparators(),
|
| base::FilePath::FromUTF8Unsafe(isolated_id).Append(FPL("root/file")).
|
| @@ -134,8 +142,8 @@ TEST_F(FileSystemContextTest, NullExternalMountPoints) {
|
| ExpectFileSystemURLMatches(
|
| cracked_external,
|
| GURL(kTestOrigin),
|
| - kFileSystemTypeExternal,
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeExternal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(
|
| DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| base::FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| @@ -154,7 +162,7 @@ TEST_F(FileSystemContextTest, FileSystemContextKeepsMountPointsAlive) {
|
| // Register system external mount point.
|
| ASSERT_TRUE(mount_points->RegisterFileSystem(
|
| "system",
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/sys/"))));
|
|
|
| @@ -172,8 +180,8 @@ TEST_F(FileSystemContextTest, FileSystemContextKeepsMountPointsAlive) {
|
| ExpectFileSystemURLMatches(
|
| cracked_external,
|
| GURL(kTestOrigin),
|
| - kFileSystemTypeExternal,
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeExternal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(
|
| DRIVE FPL("/test/sys/root/file")).NormalizePathSeparators(),
|
| base::FilePath(FPL("system/root/file")).NormalizePathSeparators(),
|
| @@ -193,32 +201,32 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| std::string isolated_file_system_name = "root";
|
| const std::string kIsolatedFileSystemID =
|
| IsolatedContext::GetInstance()->RegisterFileSystemForPath(
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(DRIVE FPL("/test/isolated/root")),
|
| &isolated_file_system_name);
|
| // Register system external mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "system",
|
| - kFileSystemTypeDrive,
|
| + fileapi::kFileSystemTypeDrive,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/sys/"))));
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| "ext",
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/ext"))));
|
| // Register a system external mount point with the same name/id as the
|
| // registered isolated mount point.
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| kIsolatedFileSystemID,
|
| - kFileSystemTypeRestrictedNativeLocal,
|
| + fileapi::kFileSystemTypeRestrictedNativeLocal,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/system/isolated"))));
|
| // Add a mount points with the same name as a system mount point to
|
| // FileSystemContext's external mount points.
|
| ASSERT_TRUE(external_mount_points->RegisterFileSystem(
|
| "ext",
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| FileSystemMountOption(),
|
| base::FilePath(DRIVE FPL("/test/local/ext/"))));
|
|
|
| @@ -242,40 +250,41 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| // Following should not be handled by the url crackers:
|
| {
|
| "pers_mount", "persistent", true /* is_valid */,
|
| - kFileSystemTypePersistent, kFileSystemTypePersistent,
|
| + fileapi::kFileSystemTypePersistent, fileapi::kFileSystemTypePersistent,
|
| FPL("pers_mount/root/file"),
|
| std::string() /* filesystem id */
|
| },
|
| {
|
| "temp_mount", "temporary", true /* is_valid */,
|
| - kFileSystemTypeTemporary, kFileSystemTypeTemporary,
|
| + fileapi::kFileSystemTypeTemporary, fileapi::kFileSystemTypeTemporary,
|
| FPL("temp_mount/root/file"),
|
| std::string() /* filesystem id */
|
| },
|
| // Should be cracked by isolated mount points:
|
| {
|
| kIsolatedFileSystemID, "isolated", true /* is_valid */,
|
| - kFileSystemTypeIsolated, kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeIsolated, fileapi::kFileSystemTypeNativeLocal,
|
| DRIVE FPL("/test/isolated/root/file"),
|
| kIsolatedFileSystemID
|
| },
|
| // Should be cracked by system mount points:
|
| {
|
| "system", "external", true /* is_valid */,
|
| - kFileSystemTypeExternal, kFileSystemTypeDrive,
|
| + fileapi::kFileSystemTypeExternal, fileapi::kFileSystemTypeDrive,
|
| DRIVE FPL("/test/sys/root/file"),
|
| "system"
|
| },
|
| {
|
| kIsolatedFileSystemID, "external", true /* is_valid */,
|
| - kFileSystemTypeExternal, kFileSystemTypeRestrictedNativeLocal,
|
| + fileapi::kFileSystemTypeExternal,
|
| + fileapi::kFileSystemTypeRestrictedNativeLocal,
|
| DRIVE FPL("/test/system/isolated/root/file"),
|
| kIsolatedFileSystemID
|
| },
|
| // Should be cracked by FileSystemContext's ExternalMountPoints.
|
| {
|
| "ext", "external", true /* is_valid */,
|
| - kFileSystemTypeExternal, kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeExternal, fileapi::kFileSystemTypeNativeLocal,
|
| DRIVE FPL("/test/local/ext/root/file"),
|
| "ext"
|
| },
|
| @@ -284,15 +293,15 @@ TEST_F(FileSystemContextTest, CrackFileSystemURL) {
|
| {
|
| "sytem", "external", false /* is_valid */,
|
| // The rest of values will be ignored.
|
| - kFileSystemTypeUnknown, kFileSystemTypeUnknown, FPL(""),
|
| - std::string()
|
| + fileapi::kFileSystemTypeUnknown, fileapi::kFileSystemTypeUnknown,
|
| + FPL(""), std::string()
|
| },
|
| // Test for URL with non-existing filesystem id.
|
| {
|
| "invalid", "external", false /* is_valid */,
|
| // The rest of values will be ignored.
|
| - kFileSystemTypeUnknown, kFileSystemTypeUnknown, FPL(""),
|
| - std::string()
|
| + fileapi::kFileSystemTypeUnknown, fileapi::kFileSystemTypeUnknown,
|
| + FPL(""), std::string()
|
| },
|
| };
|
|
|
| @@ -339,29 +348,30 @@ TEST_F(FileSystemContextTest, CanServeURLRequest) {
|
| // A request for a sandbox mount point should be served.
|
| FileSystemURL cracked_url =
|
| context->CrackURL(CreateRawFileSystemURL("persistent", "pers_mount"));
|
| - EXPECT_EQ(kFileSystemTypePersistent, cracked_url.mount_type());
|
| + EXPECT_EQ(fileapi::kFileSystemTypePersistent, cracked_url.mount_type());
|
| EXPECT_TRUE(context->CanServeURLRequest(cracked_url));
|
|
|
| // A request for an isolated mount point should NOT be served.
|
| std::string isolated_fs_name = "root";
|
| std::string isolated_fs_id =
|
| IsolatedContext::GetInstance()->RegisterFileSystemForPath(
|
| - kFileSystemTypeNativeLocal,
|
| + fileapi::kFileSystemTypeNativeLocal,
|
| base::FilePath(DRIVE FPL("/test/isolated/root")),
|
| &isolated_fs_name);
|
| cracked_url = context->CrackURL(
|
| CreateRawFileSystemURL("isolated", isolated_fs_id));
|
| - EXPECT_EQ(kFileSystemTypeIsolated, cracked_url.mount_type());
|
| + EXPECT_EQ(fileapi::kFileSystemTypeIsolated, cracked_url.mount_type());
|
| EXPECT_FALSE(context->CanServeURLRequest(cracked_url));
|
|
|
| // A request for an external mount point should be served.
|
| const std::string kExternalMountName = "ext_mount";
|
| ASSERT_TRUE(ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
|
| - kExternalMountName, kFileSystemTypeDrive, FileSystemMountOption(),
|
| + kExternalMountName, fileapi::kFileSystemTypeDrive,
|
| + FileSystemMountOption(),
|
| base::FilePath()));
|
| cracked_url = context->CrackURL(
|
| CreateRawFileSystemURL("external", kExternalMountName));
|
| - EXPECT_EQ(kFileSystemTypeExternal, cracked_url.mount_type());
|
| + EXPECT_EQ(fileapi::kFileSystemTypeExternal, cracked_url.mount_type());
|
| EXPECT_TRUE(context->CanServeURLRequest(cracked_url));
|
|
|
| ExternalMountPoints::GetSystemInstance()->RevokeFileSystem(
|
| @@ -371,4 +381,4 @@ TEST_F(FileSystemContextTest, CanServeURLRequest) {
|
|
|
| } // namespace
|
|
|
| -} // namespace fileapi
|
| +} // namespace content
|
|
|