| Index: content/browser/fileapi/file_system_dir_url_request_job_unittest.cc
 | 
| diff --git a/content/browser/fileapi/file_system_dir_url_request_job_unittest.cc b/content/browser/fileapi/file_system_dir_url_request_job_unittest.cc
 | 
| deleted file mode 100644
 | 
| index 9286dec492ee2712e77432e8569f15474aac5546..0000000000000000000000000000000000000000
 | 
| --- a/content/browser/fileapi/file_system_dir_url_request_job_unittest.cc
 | 
| +++ /dev/null
 | 
| @@ -1,464 +0,0 @@
 | 
| -// Copyright 2013 The Chromium Authors. All rights reserved.
 | 
| -// Use of this source code is governed by a BSD-style license that can be
 | 
| -// found in the LICENSE file.
 | 
| -
 | 
| -#include <stdint.h>
 | 
| -#include <string>
 | 
| -#include <utility>
 | 
| -
 | 
| -#include "base/files/file_path.h"
 | 
| -#include "base/files/file_util.h"
 | 
| -#include "base/files/scoped_temp_dir.h"
 | 
| -#include "base/format_macros.h"
 | 
| -#include "base/location.h"
 | 
| -#include "base/memory/scoped_vector.h"
 | 
| -#include "base/memory/weak_ptr.h"
 | 
| -#include "base/run_loop.h"
 | 
| -#include "base/single_thread_task_runner.h"
 | 
| -#include "base/strings/string_piece.h"
 | 
| -#include "base/strings/utf_string_conversions.h"
 | 
| -#include "base/threading/thread_task_runner_handle.h"
 | 
| -#include "build/build_config.h"
 | 
| -#include "content/public/test/mock_special_storage_policy.h"
 | 
| -#include "content/public/test/test_file_system_backend.h"
 | 
| -#include "content/public/test/test_file_system_context.h"
 | 
| -#include "net/base/net_errors.h"
 | 
| -#include "net/base/request_priority.h"
 | 
| -#include "net/http/http_request_headers.h"
 | 
| -#include "net/url_request/url_request.h"
 | 
| -#include "net/url_request/url_request_context.h"
 | 
| -#include "net/url_request/url_request_test_util.h"
 | 
| -#include "storage/browser/fileapi/external_mount_points.h"
 | 
| -#include "storage/browser/fileapi/file_system_context.h"
 | 
| -#include "storage/browser/fileapi/file_system_dir_url_request_job.h"
 | 
| -#include "storage/browser/fileapi/file_system_file_util.h"
 | 
| -#include "storage/browser/fileapi/file_system_operation_context.h"
 | 
| -#include "storage/browser/fileapi/file_system_url.h"
 | 
| -#include "testing/gtest/include/gtest/gtest.h"
 | 
| -#include "third_party/icu/source/i18n/unicode/datefmt.h"
 | 
| -#include "third_party/icu/source/i18n/unicode/regex.h"
 | 
| -
 | 
| -using storage::FileSystemContext;
 | 
| -using storage::FileSystemOperationContext;
 | 
| -using storage::FileSystemURL;
 | 
| -
 | 
| -namespace content {
 | 
| -namespace {
 | 
| -
 | 
| -// We always use the TEMPORARY FileSystem in this test.
 | 
| -const char kFileSystemURLPrefix[] = "filesystem:http://remote/temporary/";
 | 
| -
 | 
| -const char kValidExternalMountPoint[] = "mnt_name";
 | 
| -
 | 
| -// An auto mounter that will try to mount anything for |storage_domain| =
 | 
| -// "automount", but will only succeed for the mount point "mnt_name".
 | 
| -bool TestAutoMountForURLRequest(
 | 
| -    const net::URLRequest* /*url_request*/,
 | 
| -    const storage::FileSystemURL& filesystem_url,
 | 
| -    const std::string& storage_domain,
 | 
| -    const base::Callback<void(base::File::Error result)>& callback) {
 | 
| -  if (storage_domain != "automount")
 | 
| -    return false;
 | 
| -
 | 
| -  std::vector<base::FilePath::StringType> components;
 | 
| -  filesystem_url.path().GetComponents(&components);
 | 
| -  std::string mount_point = base::FilePath(components[0]).AsUTF8Unsafe();
 | 
| -
 | 
| -  if (mount_point == kValidExternalMountPoint) {
 | 
| -    storage::ExternalMountPoints::GetSystemInstance()->RegisterFileSystem(
 | 
| -        kValidExternalMountPoint,
 | 
| -        storage::kFileSystemTypeTest,
 | 
| -        storage::FileSystemMountOption(),
 | 
| -        base::FilePath());
 | 
| -    callback.Run(base::File::FILE_OK);
 | 
| -  } else {
 | 
| -    callback.Run(base::File::FILE_ERROR_NOT_FOUND);
 | 
| -  }
 | 
| -  return true;
 | 
| -}
 | 
| -
 | 
| -class FileSystemDirURLRequestJobFactory : public net::URLRequestJobFactory {
 | 
| - public:
 | 
| -  FileSystemDirURLRequestJobFactory(const std::string& storage_domain,
 | 
| -                                    FileSystemContext* context)
 | 
| -      : storage_domain_(storage_domain), file_system_context_(context) {
 | 
| -  }
 | 
| -
 | 
| -  net::URLRequestJob* MaybeCreateJobWithProtocolHandler(
 | 
| -      const std::string& scheme,
 | 
| -      net::URLRequest* request,
 | 
| -      net::NetworkDelegate* network_delegate) const override {
 | 
| -    return new storage::FileSystemDirURLRequestJob(
 | 
| -        request, network_delegate, storage_domain_, file_system_context_);
 | 
| -  }
 | 
| -
 | 
| -  net::URLRequestJob* MaybeInterceptRedirect(
 | 
| -      net::URLRequest* request,
 | 
| -      net::NetworkDelegate* network_delegate,
 | 
| -      const GURL& location) const override {
 | 
| -    return nullptr;
 | 
| -  }
 | 
| -
 | 
| -  net::URLRequestJob* MaybeInterceptResponse(
 | 
| -      net::URLRequest* request,
 | 
| -      net::NetworkDelegate* network_delegate) const override {
 | 
| -    return nullptr;
 | 
| -  }
 | 
| -
 | 
| -  bool IsHandledProtocol(const std::string& scheme) const override {
 | 
| -    return true;
 | 
| -  }
 | 
| -
 | 
| -  bool IsHandledURL(const GURL& url) const override { return true; }
 | 
| -
 | 
| -  bool IsSafeRedirectTarget(const GURL& location) const override {
 | 
| -    return false;
 | 
| -  }
 | 
| -
 | 
| - private:
 | 
| -  std::string storage_domain_;
 | 
| -  FileSystemContext* file_system_context_;
 | 
| -};
 | 
| -
 | 
| -
 | 
| -}  // namespace
 | 
| -
 | 
| -class FileSystemDirURLRequestJobTest : public testing::Test {
 | 
| - protected:
 | 
| -  FileSystemDirURLRequestJobTest()
 | 
| -    : weak_factory_(this) {
 | 
| -  }
 | 
| -
 | 
| -  void SetUp() override {
 | 
| -    ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
 | 
| -
 | 
| -    special_storage_policy_ = new MockSpecialStoragePolicy;
 | 
| -    file_system_context_ =
 | 
| -        CreateFileSystemContextForTesting(NULL, temp_dir_.GetPath());
 | 
| -
 | 
| -    file_system_context_->OpenFileSystem(
 | 
| -        GURL("http://remote/"),
 | 
| -        storage::kFileSystemTypeTemporary,
 | 
| -        storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT,
 | 
| -        base::Bind(&FileSystemDirURLRequestJobTest::OnOpenFileSystem,
 | 
| -                   weak_factory_.GetWeakPtr()));
 | 
| -    base::RunLoop().RunUntilIdle();
 | 
| -  }
 | 
| -
 | 
| -  void TearDown() override {
 | 
| -    // NOTE: order matters, request must die before delegate
 | 
| -    request_.reset(NULL);
 | 
| -    delegate_.reset(NULL);
 | 
| -  }
 | 
| -
 | 
| -  void SetUpAutoMountContext(base::FilePath* mnt_point) {
 | 
| -    *mnt_point = temp_dir_.GetPath().AppendASCII("auto_mount_dir");
 | 
| -    ASSERT_TRUE(base::CreateDirectory(*mnt_point));
 | 
| -
 | 
| -    ScopedVector<storage::FileSystemBackend> additional_providers;
 | 
| -    additional_providers.push_back(new TestFileSystemBackend(
 | 
| -        base::ThreadTaskRunnerHandle::Get().get(), *mnt_point));
 | 
| -
 | 
| -    std::vector<storage::URLRequestAutoMountHandler> handlers;
 | 
| -    handlers.push_back(base::Bind(&TestAutoMountForURLRequest));
 | 
| -
 | 
| -    file_system_context_ = CreateFileSystemContextWithAutoMountersForTesting(
 | 
| -        NULL, std::move(additional_providers), handlers, temp_dir_.GetPath());
 | 
| -  }
 | 
| -
 | 
| -  void OnOpenFileSystem(const GURL& root_url,
 | 
| -                        const std::string& name,
 | 
| -                        base::File::Error result) {
 | 
| -    ASSERT_EQ(base::File::FILE_OK, result);
 | 
| -  }
 | 
| -
 | 
| -  void TestRequestHelper(const GURL& url, bool run_to_completion,
 | 
| -                         FileSystemContext* file_system_context) {
 | 
| -    delegate_.reset(new net::TestDelegate());
 | 
| -    delegate_->set_quit_on_redirect(true);
 | 
| -    job_factory_.reset(new FileSystemDirURLRequestJobFactory(
 | 
| -        url.GetOrigin().host(), file_system_context));
 | 
| -    empty_context_.set_job_factory(job_factory_.get());
 | 
| -
 | 
| -    request_ = empty_context_.CreateRequest(
 | 
| -        url, net::DEFAULT_PRIORITY, delegate_.get());
 | 
| -    request_->Start();
 | 
| -    ASSERT_TRUE(request_->is_pending());  // verify that we're starting async
 | 
| -    if (run_to_completion)
 | 
| -      base::RunLoop().Run();
 | 
| -  }
 | 
| -
 | 
| -  void TestRequest(const GURL& url) {
 | 
| -    TestRequestHelper(url, true, file_system_context_.get());
 | 
| -  }
 | 
| -
 | 
| -  void TestRequestWithContext(const GURL& url,
 | 
| -                              FileSystemContext* file_system_context) {
 | 
| -    TestRequestHelper(url, true, file_system_context);
 | 
| -  }
 | 
| -
 | 
| -  void TestRequestNoRun(const GURL& url) {
 | 
| -    TestRequestHelper(url, false, file_system_context_.get());
 | 
| -  }
 | 
| -
 | 
| -  FileSystemURL CreateURL(const base::FilePath& file_path) {
 | 
| -    return file_system_context_->CreateCrackedFileSystemURL(
 | 
| -        GURL("http://remote"), storage::kFileSystemTypeTemporary, file_path);
 | 
| -  }
 | 
| -
 | 
| -  FileSystemOperationContext* NewOperationContext() {
 | 
| -    FileSystemOperationContext* context(
 | 
| -        new FileSystemOperationContext(file_system_context_.get()));
 | 
| -    context->set_allowed_bytes_growth(1024);
 | 
| -    return context;
 | 
| -  }
 | 
| -
 | 
| -  void CreateDirectory(const base::StringPiece& dir_name) {
 | 
| -    base::FilePath path = base::FilePath().AppendASCII(dir_name);
 | 
| -    std::unique_ptr<FileSystemOperationContext> context(NewOperationContext());
 | 
| -    ASSERT_EQ(base::File::FILE_OK, file_util()->CreateDirectory(
 | 
| -        context.get(),
 | 
| -        CreateURL(path),
 | 
| -        false /* exclusive */,
 | 
| -        false /* recursive */));
 | 
| -  }
 | 
| -
 | 
| -  void EnsureFileExists(const base::StringPiece file_name) {
 | 
| -    base::FilePath path = base::FilePath().AppendASCII(file_name);
 | 
| -    std::unique_ptr<FileSystemOperationContext> context(NewOperationContext());
 | 
| -    ASSERT_EQ(base::File::FILE_OK, file_util()->EnsureFileExists(
 | 
| -        context.get(), CreateURL(path), NULL));
 | 
| -  }
 | 
| -
 | 
| -  void TruncateFile(const base::StringPiece file_name, int64_t length) {
 | 
| -    base::FilePath path = base::FilePath().AppendASCII(file_name);
 | 
| -    std::unique_ptr<FileSystemOperationContext> context(NewOperationContext());
 | 
| -    ASSERT_EQ(base::File::FILE_OK, file_util()->Truncate(
 | 
| -        context.get(), CreateURL(path), length));
 | 
| -  }
 | 
| -
 | 
| -  base::File::Error GetFileInfo(const base::FilePath& path,
 | 
| -                                base::File::Info* file_info,
 | 
| -                                base::FilePath* platform_file_path) {
 | 
| -    std::unique_ptr<FileSystemOperationContext> context(NewOperationContext());
 | 
| -    return file_util()->GetFileInfo(context.get(),
 | 
| -                                    CreateURL(path),
 | 
| -                                    file_info, platform_file_path);
 | 
| -  }
 | 
| -
 | 
| -  // If |size| is negative, the reported size is ignored.
 | 
| -  void VerifyListingEntry(const std::string& entry_line,
 | 
| -                          const std::string& name,
 | 
| -                          const std::string& url,
 | 
| -                          bool is_directory,
 | 
| -                          int64_t size) {
 | 
| -#define NUMBER "([0-9-]*)"
 | 
| -#define STR "([^\"]*)"
 | 
| -    icu::UnicodeString pattern("^<script>addRow\\(\"" STR "\",\"" STR
 | 
| -        "\",(0|1)," NUMBER ",\"" STR "\"," NUMBER ",\"" STR "\"\\);</script>");
 | 
| -#undef NUMBER
 | 
| -#undef STR
 | 
| -    icu::UnicodeString input(entry_line.c_str());
 | 
| -
 | 
| -    UErrorCode status = U_ZERO_ERROR;
 | 
| -    icu::RegexMatcher match(pattern, input, 0, status);
 | 
| -
 | 
| -    EXPECT_TRUE(match.find());
 | 
| -    EXPECT_EQ(7, match.groupCount());
 | 
| -    EXPECT_EQ(icu::UnicodeString(name.c_str()), match.group(1, status));
 | 
| -    EXPECT_EQ(icu::UnicodeString(url.c_str()), match.group(2, status));
 | 
| -    EXPECT_EQ(icu::UnicodeString(is_directory ? "1" : "0"),
 | 
| -              match.group(3, status));
 | 
| -    if (size >= 0) {
 | 
| -      icu::UnicodeString size_string(
 | 
| -          base::FormatBytesUnlocalized(size).c_str());
 | 
| -      EXPECT_EQ(size_string, match.group(5, status));
 | 
| -    }
 | 
| -
 | 
| -    icu::UnicodeString date_ustr(match.group(7, status));
 | 
| -    std::unique_ptr<icu::DateFormat> formatter(
 | 
| -        icu::DateFormat::createDateTimeInstance(icu::DateFormat::kShort));
 | 
| -    UErrorCode parse_status = U_ZERO_ERROR;
 | 
| -    UDate udate = formatter->parse(date_ustr, parse_status);
 | 
| -    EXPECT_TRUE(U_SUCCESS(parse_status));
 | 
| -    base::Time date = base::Time::FromJsTime(udate);
 | 
| -    EXPECT_FALSE(date.is_null());
 | 
| -  }
 | 
| -
 | 
| -  GURL CreateFileSystemURL(const std::string& path) {
 | 
| -    return GURL(kFileSystemURLPrefix + path);
 | 
| -  }
 | 
| -
 | 
| -  storage::FileSystemFileUtil* file_util() {
 | 
| -    return file_system_context_->sandbox_delegate()->sync_file_util();
 | 
| -  }
 | 
| -
 | 
| -  // Put the message loop at the top, so that it's the last thing deleted.
 | 
| -  // Delete all task runner objects before the MessageLoop, to help prevent
 | 
| -  // leaks caused by tasks posted during shutdown.
 | 
| -  base::MessageLoopForIO message_loop_;
 | 
| -
 | 
| -  base::ScopedTempDir temp_dir_;
 | 
| -  net::URLRequestContext empty_context_;
 | 
| -  std::unique_ptr<net::TestDelegate> delegate_;
 | 
| -  std::unique_ptr<net::URLRequest> request_;
 | 
| -  std::unique_ptr<FileSystemDirURLRequestJobFactory> job_factory_;
 | 
| -  scoped_refptr<MockSpecialStoragePolicy> special_storage_policy_;
 | 
| -  scoped_refptr<FileSystemContext> file_system_context_;
 | 
| -  base::WeakPtrFactory<FileSystemDirURLRequestJobTest> weak_factory_;
 | 
| -};
 | 
| -
 | 
| -namespace {
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, DirectoryListing) {
 | 
| -  CreateDirectory("foo");
 | 
| -  CreateDirectory("foo/bar");
 | 
| -  CreateDirectory("foo/bar/baz");
 | 
| -
 | 
| -  EnsureFileExists("foo/bar/hoge");
 | 
| -  TruncateFile("foo/bar/hoge", 10);
 | 
| -
 | 
| -  TestRequest(CreateFileSystemURL("foo/bar/"));
 | 
| -
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  EXPECT_EQ(1, delegate_->response_started_count());
 | 
| -  EXPECT_FALSE(delegate_->received_data_before_response());
 | 
| -  EXPECT_GT(delegate_->bytes_received(), 0);
 | 
| -
 | 
| -  std::istringstream in(delegate_->data_received());
 | 
| -  std::string line;
 | 
| -  EXPECT_TRUE(std::getline(in, line));
 | 
| -
 | 
| -#if defined(OS_WIN)
 | 
| -  EXPECT_EQ("<script>start(\"foo\\\\bar\");</script>", line);
 | 
| -#elif defined(OS_POSIX)
 | 
| -  EXPECT_EQ("<script>start(\"/foo/bar\");</script>", line);
 | 
| -#endif
 | 
| -
 | 
| -  EXPECT_TRUE(std::getline(in, line));
 | 
| -  VerifyListingEntry(line, "hoge", "hoge", false, 10);
 | 
| -
 | 
| -  EXPECT_TRUE(std::getline(in, line));
 | 
| -  VerifyListingEntry(line, "baz", "baz", true, 0);
 | 
| -  EXPECT_FALSE(!!std::getline(in, line));
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, InvalidURL) {
 | 
| -  TestRequest(GURL("filesystem:/foo/bar/baz"));
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  EXPECT_TRUE(delegate_->request_failed());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_INVALID_URL, request_->status().error());
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, NoSuchRoot) {
 | 
| -  TestRequest(GURL("filesystem:http://remote/persistent/somedir/"));
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error());
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, NoSuchDirectory) {
 | 
| -  TestRequest(CreateFileSystemURL("somedir/"));
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error());
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, Cancel) {
 | 
| -  CreateDirectory("foo");
 | 
| -  TestRequestNoRun(CreateFileSystemURL("foo/"));
 | 
| -  // Run StartAsync() and only StartAsync().
 | 
| -  base::ThreadTaskRunnerHandle::Get()->DeleteSoon(FROM_HERE,
 | 
| -                                                  request_.release());
 | 
| -  base::RunLoop().RunUntilIdle();
 | 
| -  // If we get here, success! we didn't crash!
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, Incognito) {
 | 
| -  CreateDirectory("foo");
 | 
| -
 | 
| -  scoped_refptr<FileSystemContext> file_system_context =
 | 
| -      CreateIncognitoFileSystemContextForTesting(NULL, temp_dir_.GetPath());
 | 
| -
 | 
| -  TestRequestWithContext(CreateFileSystemURL("/"),
 | 
| -                         file_system_context.get());
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_TRUE(request_->status().is_success());
 | 
| -
 | 
| -  std::istringstream in(delegate_->data_received());
 | 
| -  std::string line;
 | 
| -  EXPECT_TRUE(std::getline(in, line));
 | 
| -  EXPECT_FALSE(!!std::getline(in, line));
 | 
| -
 | 
| -  TestRequestWithContext(CreateFileSystemURL("foo"),
 | 
| -                         file_system_context.get());
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error());
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, AutoMountDirectoryListing) {
 | 
| -  base::FilePath mnt_point;
 | 
| -  SetUpAutoMountContext(&mnt_point);
 | 
| -  ASSERT_TRUE(base::CreateDirectory(mnt_point));
 | 
| -  ASSERT_TRUE(base::CreateDirectory(mnt_point.AppendASCII("foo")));
 | 
| -  ASSERT_EQ(10,
 | 
| -            base::WriteFile(mnt_point.AppendASCII("bar"), "1234567890", 10));
 | 
| -
 | 
| -  TestRequest(GURL("filesystem:http://automount/external/mnt_name"));
 | 
| -
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  EXPECT_EQ(1, delegate_->response_started_count());
 | 
| -  EXPECT_FALSE(delegate_->received_data_before_response());
 | 
| -  EXPECT_GT(delegate_->bytes_received(), 0);
 | 
| -
 | 
| -  std::istringstream in(delegate_->data_received());
 | 
| -  std::string line;
 | 
| -  EXPECT_TRUE(std::getline(in, line));  // |line| contains the temp dir path.
 | 
| -
 | 
| -  // Result order is not guaranteed, so sort the results.
 | 
| -  std::vector<std::string> listing_entries;
 | 
| -  while (!!std::getline(in, line))
 | 
| -    listing_entries.push_back(line);
 | 
| -
 | 
| -  ASSERT_EQ(2U, listing_entries.size());
 | 
| -  std::sort(listing_entries.begin(), listing_entries.end());
 | 
| -  VerifyListingEntry(listing_entries[0], "bar", "bar", false, 10);
 | 
| -  VerifyListingEntry(listing_entries[1], "foo", "foo", true, -1);
 | 
| -
 | 
| -  ASSERT_TRUE(
 | 
| -      storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem(
 | 
| -          kValidExternalMountPoint));
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, AutoMountInvalidRoot) {
 | 
| -  base::FilePath mnt_point;
 | 
| -  SetUpAutoMountContext(&mnt_point);
 | 
| -  TestRequest(GURL("filesystem:http://automount/external/invalid"));
 | 
| -
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error());
 | 
| -
 | 
| -  ASSERT_FALSE(
 | 
| -      storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem(
 | 
| -          "invalid"));
 | 
| -}
 | 
| -
 | 
| -TEST_F(FileSystemDirURLRequestJobTest, AutoMountNoHandler) {
 | 
| -  base::FilePath mnt_point;
 | 
| -  SetUpAutoMountContext(&mnt_point);
 | 
| -  TestRequest(GURL("filesystem:http://noauto/external/mnt_name"));
 | 
| -
 | 
| -  ASSERT_FALSE(request_->is_pending());
 | 
| -  ASSERT_FALSE(request_->status().is_success());
 | 
| -  EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error());
 | 
| -
 | 
| -  ASSERT_FALSE(
 | 
| -      storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem(
 | 
| -          kValidExternalMountPoint));
 | 
| -}
 | 
| -
 | 
| -}  // namespace
 | 
| -}  // namespace content
 | 
| 
 |