OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "storage/browser/fileapi/recursive_operation_delegate.h" | 5 #include "storage/browser/fileapi/recursive_operation_delegate.h" |
6 | 6 |
7 #include <memory> | 7 #include <memory> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
(...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
143 | 143 |
144 operation->Cancel(); | 144 operation->Cancel(); |
145 } | 145 } |
146 | 146 |
147 } // namespace | 147 } // namespace |
148 | 148 |
149 class RecursiveOperationDelegateTest : public testing::Test { | 149 class RecursiveOperationDelegateTest : public testing::Test { |
150 protected: | 150 protected: |
151 void SetUp() override { | 151 void SetUp() override { |
152 EXPECT_TRUE(base_.CreateUniqueTempDir()); | 152 EXPECT_TRUE(base_.CreateUniqueTempDir()); |
153 sandbox_file_system_.SetUp(base_.path().AppendASCII("filesystem")); | 153 sandbox_file_system_.SetUp(base_.GetPath().AppendASCII("filesystem")); |
154 } | 154 } |
155 | 155 |
156 void TearDown() override { sandbox_file_system_.TearDown(); } | 156 void TearDown() override { sandbox_file_system_.TearDown(); } |
157 | 157 |
158 std::unique_ptr<FileSystemOperationContext> NewContext() { | 158 std::unique_ptr<FileSystemOperationContext> NewContext() { |
159 FileSystemOperationContext* context = | 159 FileSystemOperationContext* context = |
160 sandbox_file_system_.NewOperationContext(); | 160 sandbox_file_system_.NewOperationContext(); |
161 // Grant enough quota for all test cases. | 161 // Grant enough quota for all test cases. |
162 context->set_allowed_bytes_growth(1000000); | 162 context->set_allowed_bytes_growth(1000000); |
163 return base::WrapUnique(context); | 163 return base::WrapUnique(context); |
(...skipping 215 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
379 EXPECT_EQ(LoggingRecursiveOperation::LogEntry::POST_PROCESS_DIRECTORY, | 379 EXPECT_EQ(LoggingRecursiveOperation::LogEntry::POST_PROCESS_DIRECTORY, |
380 log_entries[6].type); | 380 log_entries[6].type); |
381 EXPECT_EQ(src_dir1, log_entries[6].url); | 381 EXPECT_EQ(src_dir1, log_entries[6].url); |
382 | 382 |
383 EXPECT_EQ(LoggingRecursiveOperation::LogEntry::POST_PROCESS_DIRECTORY, | 383 EXPECT_EQ(LoggingRecursiveOperation::LogEntry::POST_PROCESS_DIRECTORY, |
384 log_entries[7].type); | 384 log_entries[7].type); |
385 EXPECT_EQ(src_root, log_entries[7].url); | 385 EXPECT_EQ(src_root, log_entries[7].url); |
386 } | 386 } |
387 | 387 |
388 } // namespace content | 388 } // namespace content |
OLD | NEW |