OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/fileapi/cros_mount_point_provider.h" | 5 #include "chrome/browser/chromeos/fileapi/file_system_backend.h" |
6 | 6 |
7 #include <set> | 7 #include <set> |
8 | 8 |
9 #include "base/files/file_path.h" | 9 #include "base/files/file_path.h" |
10 #include "base/path_service.h" | 10 #include "base/path_service.h" |
11 #include "chromeos/dbus/cros_disks_client.h" | 11 #include "chromeos/dbus/cros_disks_client.h" |
12 #include "testing/gtest/include/gtest/gtest.h" | 12 #include "testing/gtest/include/gtest/gtest.h" |
13 #include "url/url_util.h" | 13 #include "url/url_util.h" |
14 #include "webkit/browser/fileapi/external_mount_points.h" | 14 #include "webkit/browser/fileapi/external_mount_points.h" |
15 #include "webkit/browser/fileapi/file_permission_policy.h" | 15 #include "webkit/browser/fileapi/file_permission_policy.h" |
(...skipping 10 matching lines...) Expand all Loading... |
26 | 26 |
27 FileSystemURL CreateFileSystemURL(const std::string& extension, | 27 FileSystemURL CreateFileSystemURL(const std::string& extension, |
28 const char* path, | 28 const char* path, |
29 ExternalMountPoints* mount_points) { | 29 ExternalMountPoints* mount_points) { |
30 return mount_points->CreateCrackedFileSystemURL( | 30 return mount_points->CreateCrackedFileSystemURL( |
31 GURL("chrome-extension://" + extension + "/"), | 31 GURL("chrome-extension://" + extension + "/"), |
32 fileapi::kFileSystemTypeExternal, | 32 fileapi::kFileSystemTypeExternal, |
33 base::FilePath::FromUTF8Unsafe(path)); | 33 base::FilePath::FromUTF8Unsafe(path)); |
34 } | 34 } |
35 | 35 |
36 TEST(CrosMountPointProviderTest, DefaultMountPoints) { | 36 TEST(ChromeOSFileSystemBackendTest, DefaultMountPoints) { |
37 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = | 37 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = |
38 new quota::MockSpecialStoragePolicy(); | 38 new quota::MockSpecialStoragePolicy(); |
39 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | 39 scoped_refptr<fileapi::ExternalMountPoints> mount_points( |
40 fileapi::ExternalMountPoints::CreateRefCounted()); | 40 fileapi::ExternalMountPoints::CreateRefCounted()); |
41 chromeos::CrosMountPointProvider provider( | 41 chromeos::FileSystemBackend backend( |
42 NULL, // drive_delegate | 42 NULL, // drive_delegate |
43 storage_policy, | 43 storage_policy, |
44 mount_points.get(), | 44 mount_points.get(), |
45 fileapi::ExternalMountPoints::GetSystemInstance()); | 45 fileapi::ExternalMountPoints::GetSystemInstance()); |
46 provider.AddSystemMountPoints(); | 46 backend.AddSystemMountPoints(); |
47 std::vector<base::FilePath> root_dirs = provider.GetRootDirectories(); | 47 std::vector<base::FilePath> root_dirs = backend.GetRootDirectories(); |
48 std::set<base::FilePath> root_dirs_set(root_dirs.begin(), root_dirs.end()); | 48 std::set<base::FilePath> root_dirs_set(root_dirs.begin(), root_dirs.end()); |
49 | 49 |
50 // By default there should be 4 mount points (in system mount points): | 50 // By default there should be 4 mount points (in system mount points): |
51 EXPECT_EQ(4u, root_dirs.size()); | 51 EXPECT_EQ(4u, root_dirs.size()); |
52 base::FilePath home_path; | 52 base::FilePath home_path; |
53 ASSERT_TRUE(PathService::Get(base::DIR_HOME, &home_path)); | 53 ASSERT_TRUE(PathService::Get(base::DIR_HOME, &home_path)); |
54 | 54 |
55 EXPECT_TRUE(root_dirs_set.count(home_path.AppendASCII("Downloads"))); | 55 EXPECT_TRUE(root_dirs_set.count(home_path.AppendASCII("Downloads"))); |
56 EXPECT_TRUE(root_dirs_set.count( | 56 EXPECT_TRUE(root_dirs_set.count( |
57 chromeos::CrosDisksClient::GetRemovableDiskMountPoint())); | 57 chromeos::CrosDisksClient::GetRemovableDiskMountPoint())); |
58 EXPECT_TRUE(root_dirs_set.count( | 58 EXPECT_TRUE(root_dirs_set.count( |
59 chromeos::CrosDisksClient::GetArchiveMountPoint())); | 59 chromeos::CrosDisksClient::GetArchiveMountPoint())); |
60 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/usr/share/oem")))); | 60 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/usr/share/oem")))); |
61 } | 61 } |
62 | 62 |
63 TEST(CrosMountPointProviderTest, GetRootDirectories) { | 63 TEST(ChromeOSFileSystemBackendTest, GetRootDirectories) { |
64 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = | 64 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = |
65 new quota::MockSpecialStoragePolicy(); | 65 new quota::MockSpecialStoragePolicy(); |
66 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | 66 scoped_refptr<fileapi::ExternalMountPoints> mount_points( |
67 fileapi::ExternalMountPoints::CreateRefCounted()); | 67 fileapi::ExternalMountPoints::CreateRefCounted()); |
68 | 68 |
69 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | 69 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( |
70 fileapi::ExternalMountPoints::CreateRefCounted()); | 70 fileapi::ExternalMountPoints::CreateRefCounted()); |
71 | 71 |
72 chromeos::CrosMountPointProvider provider( | 72 chromeos::FileSystemBackend backend( |
73 NULL, // drive_delegate | 73 NULL, // drive_delegate |
74 storage_policy, | 74 storage_policy, |
75 mount_points.get(), | 75 mount_points.get(), |
76 system_mount_points.get()); | 76 system_mount_points.get()); |
77 | 77 |
78 const size_t initial_root_dirs_size = provider.GetRootDirectories().size(); | 78 const size_t initial_root_dirs_size = backend.GetRootDirectories().size(); |
79 | 79 |
80 // Register 'local' test mount points. | 80 // Register 'local' test mount points. |
81 mount_points->RegisterFileSystem("c", | 81 mount_points->RegisterFileSystem("c", |
82 fileapi::kFileSystemTypeNativeLocal, | 82 fileapi::kFileSystemTypeNativeLocal, |
83 base::FilePath(FPL("/a/b/c"))); | 83 base::FilePath(FPL("/a/b/c"))); |
84 mount_points->RegisterFileSystem("d", | 84 mount_points->RegisterFileSystem("d", |
85 fileapi::kFileSystemTypeNativeLocal, | 85 fileapi::kFileSystemTypeNativeLocal, |
86 base::FilePath(FPL("/b/c/d"))); | 86 base::FilePath(FPL("/b/c/d"))); |
87 | 87 |
88 // Register system test mount points. | 88 // Register system test mount points. |
89 system_mount_points->RegisterFileSystem("d", | 89 system_mount_points->RegisterFileSystem("d", |
90 fileapi::kFileSystemTypeNativeLocal, | 90 fileapi::kFileSystemTypeNativeLocal, |
91 base::FilePath(FPL("/g/c/d"))); | 91 base::FilePath(FPL("/g/c/d"))); |
92 system_mount_points->RegisterFileSystem("e", | 92 system_mount_points->RegisterFileSystem("e", |
93 fileapi::kFileSystemTypeNativeLocal, | 93 fileapi::kFileSystemTypeNativeLocal, |
94 base::FilePath(FPL("/g/d/e"))); | 94 base::FilePath(FPL("/g/d/e"))); |
95 | 95 |
96 std::vector<base::FilePath> root_dirs = provider.GetRootDirectories(); | 96 std::vector<base::FilePath> root_dirs = backend.GetRootDirectories(); |
97 std::set<base::FilePath> root_dirs_set(root_dirs.begin(), root_dirs.end()); | 97 std::set<base::FilePath> root_dirs_set(root_dirs.begin(), root_dirs.end()); |
98 EXPECT_EQ(initial_root_dirs_size + 4, root_dirs.size()); | 98 EXPECT_EQ(initial_root_dirs_size + 4, root_dirs.size()); |
99 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/a/b/c")))); | 99 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/a/b/c")))); |
100 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/b/c/d")))); | 100 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/b/c/d")))); |
101 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/g/c/d")))); | 101 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/g/c/d")))); |
102 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/g/d/e")))); | 102 EXPECT_TRUE(root_dirs_set.count(base::FilePath(FPL("/g/d/e")))); |
103 } | 103 } |
104 | 104 |
105 TEST(CrosMountPointProviderTest, AccessPermissions) { | 105 TEST(ChromeOSFileSystemBackendTest, AccessPermissions) { |
106 url_util::AddStandardScheme("chrome-extension"); | 106 url_util::AddStandardScheme("chrome-extension"); |
107 | 107 |
108 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = | 108 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = |
109 new quota::MockSpecialStoragePolicy(); | 109 new quota::MockSpecialStoragePolicy(); |
110 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | 110 scoped_refptr<fileapi::ExternalMountPoints> mount_points( |
111 fileapi::ExternalMountPoints::CreateRefCounted()); | 111 fileapi::ExternalMountPoints::CreateRefCounted()); |
112 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | 112 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( |
113 fileapi::ExternalMountPoints::CreateRefCounted()); | 113 fileapi::ExternalMountPoints::CreateRefCounted()); |
114 chromeos::CrosMountPointProvider provider( | 114 chromeos::FileSystemBackend backend( |
115 NULL, // drive_delegate | 115 NULL, // drive_delegate |
116 storage_policy, | 116 storage_policy, |
117 mount_points.get(), | 117 mount_points.get(), |
118 system_mount_points.get()); | 118 system_mount_points.get()); |
119 | 119 |
120 std::string extension("ddammdhioacbehjngdmkjcjbnfginlla"); | 120 std::string extension("ddammdhioacbehjngdmkjcjbnfginlla"); |
121 | 121 |
122 storage_policy->AddFileHandler(extension); | 122 storage_policy->AddFileHandler(extension); |
123 | 123 |
124 // Initialize mount points. | 124 // Initialize mount points. |
125 ASSERT_TRUE(system_mount_points->RegisterFileSystem( | 125 ASSERT_TRUE(system_mount_points->RegisterFileSystem( |
126 "system", | 126 "system", |
127 fileapi::kFileSystemTypeNativeLocal, | 127 fileapi::kFileSystemTypeNativeLocal, |
128 base::FilePath(FPL("/g/system")))); | 128 base::FilePath(FPL("/g/system")))); |
129 ASSERT_TRUE(mount_points->RegisterFileSystem( | 129 ASSERT_TRUE(mount_points->RegisterFileSystem( |
130 "removable", | 130 "removable", |
131 fileapi::kFileSystemTypeNativeLocal, | 131 fileapi::kFileSystemTypeNativeLocal, |
132 base::FilePath(FPL("/media/removable")))); | 132 base::FilePath(FPL("/media/removable")))); |
133 ASSERT_TRUE(mount_points->RegisterFileSystem( | 133 ASSERT_TRUE(mount_points->RegisterFileSystem( |
134 "oem", | 134 "oem", |
135 fileapi::kFileSystemTypeRestrictedNativeLocal, | 135 fileapi::kFileSystemTypeRestrictedNativeLocal, |
136 base::FilePath(FPL("/usr/share/oem")))); | 136 base::FilePath(FPL("/usr/share/oem")))); |
137 | 137 |
138 // Provider specific mount point access. | 138 // Backend specific mount point access. |
139 EXPECT_FALSE(provider.IsAccessAllowed( | 139 EXPECT_FALSE(backend.IsAccessAllowed( |
140 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); | 140 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); |
141 | 141 |
142 provider.GrantFileAccessToExtension(extension, | 142 backend.GrantFileAccessToExtension(extension, |
143 base::FilePath(FPL("removable/foo"))); | 143 base::FilePath(FPL("removable/foo"))); |
144 EXPECT_TRUE(provider.IsAccessAllowed( | 144 EXPECT_TRUE(backend.IsAccessAllowed( |
145 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); | 145 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); |
146 EXPECT_FALSE(provider.IsAccessAllowed( | 146 EXPECT_FALSE(backend.IsAccessAllowed( |
147 CreateFileSystemURL(extension, "removable/foo1", mount_points.get()))); | 147 CreateFileSystemURL(extension, "removable/foo1", mount_points.get()))); |
148 | 148 |
149 // System mount point access. | 149 // System mount point access. |
150 EXPECT_FALSE(provider.IsAccessAllowed( | 150 EXPECT_FALSE(backend.IsAccessAllowed( |
151 CreateFileSystemURL(extension, "system/foo", system_mount_points.get()))); | 151 CreateFileSystemURL(extension, "system/foo", system_mount_points.get()))); |
152 | 152 |
153 provider.GrantFileAccessToExtension(extension, | 153 backend.GrantFileAccessToExtension(extension, |
154 base::FilePath(FPL("system/foo"))); | 154 base::FilePath(FPL("system/foo"))); |
155 EXPECT_TRUE(provider.IsAccessAllowed( | 155 EXPECT_TRUE(backend.IsAccessAllowed( |
156 CreateFileSystemURL(extension, "system/foo", system_mount_points.get()))); | 156 CreateFileSystemURL(extension, "system/foo", system_mount_points.get()))); |
157 EXPECT_FALSE(provider.IsAccessAllowed( | 157 EXPECT_FALSE(backend.IsAccessAllowed( |
158 CreateFileSystemURL(extension, "system/foo1", | 158 CreateFileSystemURL(extension, "system/foo1", |
159 system_mount_points.get()))); | 159 system_mount_points.get()))); |
160 | 160 |
161 // oem is restricted file system. | 161 // oem is restricted file system. |
162 provider.GrantFileAccessToExtension( | 162 backend.GrantFileAccessToExtension( |
163 extension, base::FilePath(FPL("oem/foo"))); | 163 extension, base::FilePath(FPL("oem/foo"))); |
164 // The extension should not be able to access the file even if | 164 // The extension should not be able to access the file even if |
165 // GrantFileAccessToExtension was called. | 165 // GrantFileAccessToExtension was called. |
166 EXPECT_FALSE(provider.IsAccessAllowed( | 166 EXPECT_FALSE(backend.IsAccessAllowed( |
167 CreateFileSystemURL(extension, "oem/foo", mount_points.get()))); | 167 CreateFileSystemURL(extension, "oem/foo", mount_points.get()))); |
168 | 168 |
169 provider.GrantFullAccessToExtension(extension); | 169 backend.GrantFullAccessToExtension(extension); |
170 // The extension should be able to access restricted file system after it was | 170 // The extension should be able to access restricted file system after it was |
171 // granted full access. | 171 // granted full access. |
172 EXPECT_TRUE(provider.IsAccessAllowed( | 172 EXPECT_TRUE(backend.IsAccessAllowed( |
173 CreateFileSystemURL(extension, "oem/foo", mount_points.get()))); | 173 CreateFileSystemURL(extension, "oem/foo", mount_points.get()))); |
174 // The extension which was granted full access should be able to access any | 174 // The extension which was granted full access should be able to access any |
175 // path on current file systems. | 175 // path on current file systems. |
176 EXPECT_TRUE(provider.IsAccessAllowed( | 176 EXPECT_TRUE(backend.IsAccessAllowed( |
177 CreateFileSystemURL(extension, "removable/foo1", mount_points.get()))); | 177 CreateFileSystemURL(extension, "removable/foo1", mount_points.get()))); |
178 EXPECT_TRUE(provider.IsAccessAllowed( | 178 EXPECT_TRUE(backend.IsAccessAllowed( |
179 CreateFileSystemURL(extension, "system/foo1", | 179 CreateFileSystemURL(extension, "system/foo1", |
180 system_mount_points.get()))); | 180 system_mount_points.get()))); |
181 | 181 |
182 // The extension cannot access new mount points. | 182 // The extension cannot access new mount points. |
183 // TODO(tbarzic): This should probably be changed. | 183 // TODO(tbarzic): This should probably be changed. |
184 ASSERT_TRUE(mount_points->RegisterFileSystem( | 184 ASSERT_TRUE(mount_points->RegisterFileSystem( |
185 "test", | 185 "test", |
186 fileapi::kFileSystemTypeNativeLocal, | 186 fileapi::kFileSystemTypeNativeLocal, |
187 base::FilePath(FPL("/foo/test")))); | 187 base::FilePath(FPL("/foo/test")))); |
188 EXPECT_FALSE(provider.IsAccessAllowed( | 188 EXPECT_FALSE(backend.IsAccessAllowed( |
189 CreateFileSystemURL(extension, "test_/foo", mount_points.get()))); | 189 CreateFileSystemURL(extension, "test_/foo", mount_points.get()))); |
190 | 190 |
191 provider.RevokeAccessForExtension(extension); | 191 backend.RevokeAccessForExtension(extension); |
192 EXPECT_FALSE(provider.IsAccessAllowed( | 192 EXPECT_FALSE(backend.IsAccessAllowed( |
193 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); | 193 CreateFileSystemURL(extension, "removable/foo", mount_points.get()))); |
194 | 194 |
195 fileapi::FileSystemURL internal_url = FileSystemURL::CreateForTest( | 195 fileapi::FileSystemURL internal_url = FileSystemURL::CreateForTest( |
196 GURL("chrome://foo"), | 196 GURL("chrome://foo"), |
197 fileapi::kFileSystemTypeExternal, | 197 fileapi::kFileSystemTypeExternal, |
198 base::FilePath(FPL("removable/"))); | 198 base::FilePath(FPL("removable/"))); |
199 // Internal WebUI should have full access. | 199 // Internal WebUI should have full access. |
200 EXPECT_TRUE(provider.IsAccessAllowed(internal_url)); | 200 EXPECT_TRUE(backend.IsAccessAllowed(internal_url)); |
201 } | 201 } |
202 | 202 |
203 TEST(CrosMountPointProvider, GetVirtualPathConflictWithSystemPoints) { | 203 TEST(FileSystemBackendTest, GetVirtualPathConflictWithSystemPoints) { |
204 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = | 204 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = |
205 new quota::MockSpecialStoragePolicy(); | 205 new quota::MockSpecialStoragePolicy(); |
206 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | 206 scoped_refptr<fileapi::ExternalMountPoints> mount_points( |
207 fileapi::ExternalMountPoints::CreateRefCounted()); | 207 fileapi::ExternalMountPoints::CreateRefCounted()); |
208 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | 208 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( |
209 fileapi::ExternalMountPoints::CreateRefCounted()); | 209 fileapi::ExternalMountPoints::CreateRefCounted()); |
210 chromeos::CrosMountPointProvider provider( | 210 chromeos::FileSystemBackend backend( |
211 NULL, // drive_delegate | 211 NULL, // drive_delegate |
212 storage_policy, | 212 storage_policy, |
213 mount_points.get(), | 213 mount_points.get(), |
214 system_mount_points.get()); | 214 system_mount_points.get()); |
215 | 215 |
216 const fileapi::FileSystemType type = fileapi::kFileSystemTypeNativeLocal; | 216 const fileapi::FileSystemType type = fileapi::kFileSystemTypeNativeLocal; |
217 | 217 |
218 // Provider specific mount points. | 218 // Backend specific mount points. |
219 ASSERT_TRUE( | 219 ASSERT_TRUE( |
220 mount_points->RegisterFileSystem("b", type, base::FilePath(FPL("/a/b")))); | 220 mount_points->RegisterFileSystem("b", type, base::FilePath(FPL("/a/b")))); |
221 ASSERT_TRUE( | 221 ASSERT_TRUE( |
222 mount_points->RegisterFileSystem("y", type, base::FilePath(FPL("/z/y")))); | 222 mount_points->RegisterFileSystem("y", type, base::FilePath(FPL("/z/y")))); |
223 ASSERT_TRUE( | 223 ASSERT_TRUE( |
224 mount_points->RegisterFileSystem("n", type, base::FilePath(FPL("/m/n")))); | 224 mount_points->RegisterFileSystem("n", type, base::FilePath(FPL("/m/n")))); |
225 | 225 |
226 // System mount points | 226 // System mount points |
227 ASSERT_TRUE(system_mount_points->RegisterFileSystem( | 227 ASSERT_TRUE(system_mount_points->RegisterFileSystem( |
228 "gb", type, base::FilePath(FPL("/a/b")))); | 228 "gb", type, base::FilePath(FPL("/a/b")))); |
(...skipping 20 matching lines...) Expand all Loading... |
249 { FPL("/z/q/r/s"), true, FPL("gz/q/r/s") }, | 249 { FPL("/z/q/r/s"), true, FPL("gz/q/r/s") }, |
250 // No match. | 250 // No match. |
251 { FPL("/foo/xxx"), false, FPL("") }, | 251 { FPL("/foo/xxx"), false, FPL("") }, |
252 }; | 252 }; |
253 | 253 |
254 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | 254 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { |
255 // Initialize virtual path with a value. | 255 // Initialize virtual path with a value. |
256 base::FilePath virtual_path(FPL("/mount")); | 256 base::FilePath virtual_path(FPL("/mount")); |
257 base::FilePath local_path(kTestCases[i].local_path); | 257 base::FilePath local_path(kTestCases[i].local_path); |
258 EXPECT_EQ(kTestCases[i].success, | 258 EXPECT_EQ(kTestCases[i].success, |
259 provider.GetVirtualPath(local_path, &virtual_path)) | 259 backend.GetVirtualPath(local_path, &virtual_path)) |
260 << "Resolving " << kTestCases[i].local_path; | 260 << "Resolving " << kTestCases[i].local_path; |
261 | 261 |
262 // There are no guarantees for |virtual_path| value if |GetVirtualPath| | 262 // There are no guarantees for |virtual_path| value if |GetVirtualPath| |
263 // fails. | 263 // fails. |
264 if (!kTestCases[i].success) | 264 if (!kTestCases[i].success) |
265 continue; | 265 continue; |
266 | 266 |
267 base::FilePath expected_virtual_path(kTestCases[i].virtual_path); | 267 base::FilePath expected_virtual_path(kTestCases[i].virtual_path); |
268 EXPECT_EQ(expected_virtual_path, virtual_path) | 268 EXPECT_EQ(expected_virtual_path, virtual_path) |
269 << "Resolving " << kTestCases[i].local_path; | 269 << "Resolving " << kTestCases[i].local_path; |
270 } | 270 } |
271 } | 271 } |
272 | 272 |
273 } // namespace | 273 } // namespace |
OLD | NEW |