Index: webkit/browser/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
diff --git a/webkit/chromeos/fileapi/cros_mount_point_provider_unittest.cc b/webkit/browser/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
similarity index 97% |
rename from webkit/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
rename to webkit/browser/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
index 43d680ecb51abc46a93e131b80b419e88db08020..9eadd7c900e0b52ac152f6dd504e8895db8ba987 100644 |
--- a/webkit/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
+++ b/webkit/browser/chromeos/fileapi/cros_mount_point_provider_unittest.cc |
@@ -2,7 +2,7 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "webkit/chromeos/fileapi/cros_mount_point_provider.h" |
+#include "webkit/browser/chromeos/fileapi/cros_mount_point_provider.h" |
#include <set> |
@@ -172,7 +172,8 @@ TEST(CrosMountPointProviderTest, AccessPermissions) { |
kPermission)); |
// oem is restricted file system. |
- provider.GrantFileAccessToExtension(extension, base::FilePath(FPL("oem/foo"))); |
+ provider.GrantFileAccessToExtension( |
+ extension, base::FilePath(FPL("oem/foo"))); |
// The extension should not be able to access the file even if |
// GrantFileAccessToExtension was called. |
EXPECT_EQ( |
@@ -257,7 +258,8 @@ TEST(CrosMountPointProvider, GetVirtualPathConflictWithSystemPoints) { |
ASSERT_TRUE(system_mount_points->RegisterFileSystem( |
"gb", type, base::FilePath(FPL("/a/b")))); |
ASSERT_TRUE( |
- system_mount_points->RegisterFileSystem("gz", type, base::FilePath(FPL("/z")))); |
+ system_mount_points->RegisterFileSystem( |
+ "gz", type, base::FilePath(FPL("/z")))); |
ASSERT_TRUE(system_mount_points->RegisterFileSystem( |
"gp", type, base::FilePath(FPL("/m/n/o/p")))); |