Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(860)

Unified Diff: chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc

Issue 244623003: [fsp] [recommit] Add FileSystemURLParser to the file system provider. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebased. Created 6 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc
diff --git a/chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc b/chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc
index 2b24956bc372fdca1cbf4688d27dad0a7d7583e8..f4f843b1b399cb98a90ece4d07ebbe471f32710c 100644
--- a/chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc
+++ b/chrome/browser/chromeos/file_system_provider/mount_path_util_unittest.cc
@@ -5,44 +5,155 @@
#include <string>
#include "base/files/file.h"
+#include "base/memory/scoped_ptr.h"
+#include "chrome/browser/chromeos/file_system_provider/fake_provided_file_system.h"
#include "chrome/browser/chromeos/file_system_provider/mount_path_util.h"
+#include "chrome/browser/chromeos/file_system_provider/provided_file_system_interface.h"
+#include "chrome/browser/chromeos/file_system_provider/service.h"
+#include "chrome/browser/chromeos/file_system_provider/service_factory.h"
#include "chrome/browser/chromeos/login/fake_user_manager.h"
+#include "chrome/browser/profiles/profile.h"
+#include "chrome/test/base/testing_browser_process.h"
#include "chrome/test/base/testing_profile.h"
+#include "chrome/test/base/testing_profile_manager.h"
+#include "components/keyed_service/core/keyed_service.h"
+#include "content/public/browser/browser_context.h"
#include "content/public/test/test_browser_thread_bundle.h"
+#include "extensions/browser/extension_registry.h"
#include "testing/gtest/include/gtest/gtest.h"
+#include "webkit/browser/fileapi/external_mount_points.h"
namespace chromeos {
namespace file_system_provider {
namespace util {
+namespace {
+
+const char kExtensionId[] = "mbflcebpggnecokmikipoihdbecnjfoj";
+const char kFileSystemName[] = "Camera Pictures";
+
+// Creates a FileSystemURL for tests.
+fileapi::FileSystemURL CreateFileSystemURL(Profile* profile,
+ const std::string& extension_id,
+ int file_system_id,
+ const base::FilePath& file_path) {
+ const std::string origin = std::string("chrome-extension://") + kExtensionId;
+ const base::FilePath mount_path =
+ util::GetMountPath(profile, extension_id, file_system_id);
+ const fileapi::ExternalMountPoints* const mount_points =
+ fileapi::ExternalMountPoints::GetSystemInstance();
+ DCHECK(mount_points);
+ return mount_points->CreateCrackedFileSystemURL(
+ GURL(origin),
+ fileapi::kFileSystemTypeExternal,
+ base::FilePath(mount_path.BaseName().Append(file_path)));
+}
+
+// Creates a Service instance. Used to be able to destroy the service in
+// TearDown().
+KeyedService* CreateService(content::BrowserContext* context) {
+ return new Service(Profile::FromBrowserContext(context),
+ extensions::ExtensionRegistry::Get(context));
+}
+
+} // namespace
+
class FileSystemProviderMountPathUtilTest : public testing::Test {
protected:
FileSystemProviderMountPathUtilTest() {}
virtual ~FileSystemProviderMountPathUtilTest() {}
virtual void SetUp() OVERRIDE {
+ profile_manager_.reset(
+ new TestingProfileManager(TestingBrowserProcess::GetGlobal()));
+ ASSERT_TRUE(profile_manager_->SetUp());
+ profile_ = profile_manager_->CreateTestingProfile("testing-profile");
user_manager_ = new FakeUserManager();
user_manager_enabler_.reset(new ScopedUserManagerEnabler(user_manager_));
- profile_.reset(new TestingProfile);
user_manager_->AddUser(profile_->GetProfileName());
+ ServiceFactory::GetInstance()->SetTestingFactory(profile_, &CreateService);
+ file_system_provider_service_ = Service::Get(profile_);
+ file_system_provider_service_->SetFileSystemFactoryForTests(
+ base::Bind(&FakeProvidedFileSystem::Create));
+ }
+
+ virtual void TearDown() OVERRIDE {
+ // Setting the testing factory to NULL will destroy the created service
+ // associated with the testing profile.
+ ServiceFactory::GetInstance()->SetTestingFactory(profile_, NULL);
}
content::TestBrowserThreadBundle thread_bundle_;
- scoped_ptr<TestingProfile> profile_;
+ scoped_ptr<TestingProfileManager> profile_manager_;
+ TestingProfile* profile_; // Owned by TestingProfileManager.
scoped_ptr<ScopedUserManagerEnabler> user_manager_enabler_;
FakeUserManager* user_manager_;
+ Service* file_system_provider_service_; // Owned by its factory.
};
-TEST_F(FileSystemProviderMountPathUtilTest, GetMountPointPath) {
+TEST_F(FileSystemProviderMountPathUtilTest, GetMountPath) {
const std::string kExtensionId = "mbflcebpggnecokmikipoihdbecnjfoj";
const int kFileSystemId = 1;
- base::FilePath result =
- GetMountPointPath(profile_.get(), kExtensionId, kFileSystemId);
- EXPECT_EQ("/provided/mbflcebpggnecokmikipoihdbecnjfoj-1-testing_profile-hash",
+ base::FilePath result = GetMountPath(profile_, kExtensionId, kFileSystemId);
+ EXPECT_EQ("/provided/mbflcebpggnecokmikipoihdbecnjfoj-1-testing-profile-hash",
result.AsUTF8Unsafe());
}
+TEST_F(FileSystemProviderMountPathUtilTest, Parser) {
+ const int file_system_id = file_system_provider_service_->MountFileSystem(
+ kExtensionId, kFileSystemName);
+ EXPECT_LT(0, file_system_id);
+
+ const base::FilePath kFilePath = base::FilePath("hello/world.txt");
+ const fileapi::FileSystemURL url =
+ CreateFileSystemURL(profile_, kExtensionId, file_system_id, kFilePath);
+ EXPECT_TRUE(url.is_valid());
+
+ FileSystemURLParser parser(url);
+ EXPECT_TRUE(parser.Parse());
+
+ ProvidedFileSystemInterface* file_system = parser.file_system();
+ ASSERT_TRUE(file_system);
+ EXPECT_EQ(file_system_id, file_system->GetFileSystemInfo().file_system_id());
+ EXPECT_EQ(kFilePath.AsUTF8Unsafe(), parser.file_path().AsUTF8Unsafe());
+}
+
+TEST_F(FileSystemProviderMountPathUtilTest, Parser_RootPath) {
+ const int file_system_id = file_system_provider_service_->MountFileSystem(
+ kExtensionId, kFileSystemName);
+ EXPECT_LT(0, file_system_id);
+
+ const base::FilePath kFilePath = base::FilePath();
+ const fileapi::FileSystemURL url =
+ CreateFileSystemURL(profile_, kExtensionId, file_system_id, kFilePath);
+ EXPECT_TRUE(url.is_valid());
+
+ FileSystemURLParser parser(url);
+ EXPECT_TRUE(parser.Parse());
+
+ ProvidedFileSystemInterface* file_system = parser.file_system();
+ ASSERT_TRUE(file_system);
+ EXPECT_EQ(file_system_id, file_system->GetFileSystemInfo().file_system_id());
+ EXPECT_EQ(kFilePath.AsUTF8Unsafe(), parser.file_path().AsUTF8Unsafe());
+}
+
+TEST_F(FileSystemProviderMountPathUtilTest, Parser_WrongUrl) {
+ const int file_system_id = file_system_provider_service_->MountFileSystem(
+ kExtensionId, kFileSystemName);
+ EXPECT_LT(0, file_system_id);
+
+ const base::FilePath kFilePath = base::FilePath("hello");
+ const fileapi::FileSystemURL url = CreateFileSystemURL(
+ profile_, kExtensionId, file_system_id + 1, kFilePath);
+ // It is impossible to create a cracked URL for a mount point which doesn't
+ // exist, therefore is will always be invalid, and empty.
+ EXPECT_FALSE(url.is_valid());
+
+ FileSystemURLParser parser(url);
+ EXPECT_FALSE(parser.Parse());
+}
+
} // namespace util
} // namespace file_system_provider
} // namespace chromeos

Powered by Google App Engine
This is Rietveld 408576698