| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "webkit/browser/fileapi/external_mount_points.h" | |
| 6 | |
| 7 #include <string> | |
| 8 | |
| 9 #include "base/files/file_path.h" | |
| 10 #include "testing/gtest/include/gtest/gtest.h" | |
| 11 #include "webkit/browser/fileapi/file_system_url.h" | |
| 12 | |
| 13 #define FPL FILE_PATH_LITERAL | |
| 14 | |
| 15 #if defined(FILE_PATH_USES_DRIVE_LETTERS) | |
| 16 #define DRIVE FPL("C:") | |
| 17 #else | |
| 18 #define DRIVE | |
| 19 #endif | |
| 20 | |
| 21 using fileapi::FileSystemURL; | |
| 22 | |
| 23 namespace { | |
| 24 | |
| 25 TEST(ExternalMountPointsTest, AddMountPoint) { | |
| 26 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 27 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 28 | |
| 29 struct TestCase { | |
| 30 // The mount point's name. | |
| 31 const char* const name; | |
| 32 // The mount point's path. | |
| 33 const base::FilePath::CharType* const path; | |
| 34 // Whether the mount point registration should succeed. | |
| 35 bool success; | |
| 36 // Path returned by GetRegisteredPath. NULL if the method is expected to | |
| 37 // fail. | |
| 38 const base::FilePath::CharType* const registered_path; | |
| 39 }; | |
| 40 | |
| 41 const TestCase kTestCases[] = { | |
| 42 // Valid mount point. | |
| 43 { "test", DRIVE FPL("/foo/test"), true, DRIVE FPL("/foo/test") }, | |
| 44 // Valid mount point with only one path component. | |
| 45 { "bbb", DRIVE FPL("/bbb"), true, DRIVE FPL("/bbb") }, | |
| 46 // Existing mount point path is substring of the mount points path. | |
| 47 { "test11", DRIVE FPL("/foo/test11"), true, DRIVE FPL("/foo/test11") }, | |
| 48 // Path substring of an existing path. | |
| 49 { "test1", DRIVE FPL("/foo/test1"), true, DRIVE FPL("/foo/test1") }, | |
| 50 // Empty mount point name and path. | |
| 51 { "", DRIVE FPL(""), false, NULL }, | |
| 52 // Empty mount point name. | |
| 53 { "", DRIVE FPL("/ddd"), false, NULL }, | |
| 54 // Empty mount point path. | |
| 55 { "empty_path", FPL(""), true, FPL("") }, | |
| 56 // Name different from path's base name. | |
| 57 { "not_base_name", DRIVE FPL("/x/y/z"), true, DRIVE FPL("/x/y/z") }, | |
| 58 // References parent. | |
| 59 { "invalid", DRIVE FPL("../foo/invalid"), false, NULL }, | |
| 60 // Relative path. | |
| 61 { "relative", DRIVE FPL("foo/relative"), false, NULL }, | |
| 62 // Existing mount point path. | |
| 63 { "path_exists", DRIVE FPL("/foo/test"), false, NULL }, | |
| 64 // Mount point with the same name exists. | |
| 65 { "test", DRIVE FPL("/foo/a/test_name_exists"), false, | |
| 66 DRIVE FPL("/foo/test") }, | |
| 67 // Child of an existing mount point. | |
| 68 { "a1", DRIVE FPL("/foo/test/a"), false, NULL }, | |
| 69 // Parent of an existing mount point. | |
| 70 { "foo1", DRIVE FPL("/foo"), false, NULL }, | |
| 71 // Bit bigger depth. | |
| 72 { "g", DRIVE FPL("/foo/a/b/c/d/e/f/g"), true, | |
| 73 DRIVE FPL("/foo/a/b/c/d/e/f/g") }, | |
| 74 // Sibling mount point (with similar name) exists. | |
| 75 { "ff", DRIVE FPL("/foo/a/b/c/d/e/ff"), true, | |
| 76 DRIVE FPL("/foo/a/b/c/d/e/ff") }, | |
| 77 // Lexicographically last among existing mount points. | |
| 78 { "yyy", DRIVE FPL("/zzz/yyy"), true, DRIVE FPL("/zzz/yyy") }, | |
| 79 // Parent of the lexicographically last mount point. | |
| 80 { "zzz1", DRIVE FPL("/zzz"), false, NULL }, | |
| 81 // Child of the lexicographically last mount point. | |
| 82 { "xxx1", DRIVE FPL("/zzz/yyy/xxx"), false, NULL }, | |
| 83 // Lexicographically first among existing mount points. | |
| 84 { "b", DRIVE FPL("/a/b"), true, DRIVE FPL("/a/b") }, | |
| 85 // Parent of lexicographically first mount point. | |
| 86 { "a2", DRIVE FPL("/a"), false, NULL }, | |
| 87 // Child of lexicographically last mount point. | |
| 88 { "c1", DRIVE FPL("/a/b/c"), false, NULL }, | |
| 89 // Parent to all of the mount points. | |
| 90 { "root", DRIVE FPL("/"), false, NULL }, | |
| 91 // Path contains .. component. | |
| 92 { "funky", DRIVE FPL("/tt/fun/../funky"), false, NULL }, | |
| 93 // Windows separators. | |
| 94 #if defined(FILE_PATH_USES_WIN_SEPARATORS) | |
| 95 { "win", DRIVE FPL("\\try\\separators\\win"), true, | |
| 96 DRIVE FPL("\\try\\separators\\win") }, | |
| 97 { "win1", DRIVE FPL("\\try/separators\\win1"), true, | |
| 98 DRIVE FPL("\\try/separators\\win1") }, | |
| 99 { "win2", DRIVE FPL("\\try/separators\\win"), false, NULL }, | |
| 100 #else | |
| 101 { "win", DRIVE FPL("\\separators\\win"), false, NULL }, | |
| 102 { "win1", DRIVE FPL("\\try/separators\\win1"), false, NULL }, | |
| 103 #endif | |
| 104 // Win separators, but relative path. | |
| 105 { "win2", DRIVE FPL("try\\separators\\win2"), false, NULL }, | |
| 106 }; | |
| 107 | |
| 108 // Test adding mount points. | |
| 109 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 110 EXPECT_EQ(kTestCases[i].success, | |
| 111 mount_points->RegisterFileSystem( | |
| 112 kTestCases[i].name, | |
| 113 fileapi::kFileSystemTypeNativeLocal, | |
| 114 fileapi::FileSystemMountOption(), | |
| 115 base::FilePath(kTestCases[i].path))) | |
| 116 << "Adding mount point: " << kTestCases[i].name << " with path " | |
| 117 << kTestCases[i].path; | |
| 118 } | |
| 119 | |
| 120 // Test that final mount point presence state is as expected. | |
| 121 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 122 base::FilePath found_path; | |
| 123 EXPECT_EQ(kTestCases[i].registered_path != NULL, | |
| 124 mount_points->GetRegisteredPath(kTestCases[i].name, &found_path)) | |
| 125 << "Test case: " << i; | |
| 126 | |
| 127 if (kTestCases[i].registered_path) { | |
| 128 base::FilePath expected_path(kTestCases[i].registered_path); | |
| 129 EXPECT_EQ(expected_path.NormalizePathSeparators(), found_path); | |
| 130 } | |
| 131 } | |
| 132 } | |
| 133 | |
| 134 TEST(ExternalMountPointsTest, GetVirtualPath) { | |
| 135 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 136 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 137 | |
| 138 mount_points->RegisterFileSystem("c", | |
| 139 fileapi::kFileSystemTypeNativeLocal, | |
| 140 fileapi::FileSystemMountOption(), | |
| 141 base::FilePath(DRIVE FPL("/a/b/c"))); | |
| 142 // Note that "/a/b/c" < "/a/b/c(1)" < "/a/b/c/". | |
| 143 mount_points->RegisterFileSystem("c(1)", | |
| 144 fileapi::kFileSystemTypeNativeLocal, | |
| 145 fileapi::FileSystemMountOption(), | |
| 146 base::FilePath(DRIVE FPL("/a/b/c(1)"))); | |
| 147 mount_points->RegisterFileSystem("x", | |
| 148 fileapi::kFileSystemTypeNativeLocal, | |
| 149 fileapi::FileSystemMountOption(), | |
| 150 base::FilePath(DRIVE FPL("/z/y/x"))); | |
| 151 mount_points->RegisterFileSystem("o", | |
| 152 fileapi::kFileSystemTypeNativeLocal, | |
| 153 fileapi::FileSystemMountOption(), | |
| 154 base::FilePath(DRIVE FPL("/m/n/o"))); | |
| 155 // A mount point whose name does not match its path base name. | |
| 156 mount_points->RegisterFileSystem("mount", | |
| 157 fileapi::kFileSystemTypeNativeLocal, | |
| 158 fileapi::FileSystemMountOption(), | |
| 159 base::FilePath(DRIVE FPL("/root/foo"))); | |
| 160 // A mount point with an empty path. | |
| 161 mount_points->RegisterFileSystem("empty_path", | |
| 162 fileapi::kFileSystemTypeNativeLocal, | |
| 163 fileapi::FileSystemMountOption(), | |
| 164 base::FilePath()); | |
| 165 | |
| 166 struct TestCase { | |
| 167 const base::FilePath::CharType* const local_path; | |
| 168 bool success; | |
| 169 const base::FilePath::CharType* const virtual_path; | |
| 170 }; | |
| 171 | |
| 172 const TestCase kTestCases[] = { | |
| 173 // Empty path. | |
| 174 { FPL(""), false, FPL("") }, | |
| 175 // No registered mount point (but is parent to a mount point). | |
| 176 { DRIVE FPL("/a/b"), false, FPL("") }, | |
| 177 // No registered mount point (but is parent to a mount point). | |
| 178 { DRIVE FPL("/z/y"), false, FPL("") }, | |
| 179 // No registered mount point (but is parent to a mount point). | |
| 180 { DRIVE FPL("/m/n"), false, FPL("") }, | |
| 181 // No registered mount point. | |
| 182 { DRIVE FPL("/foo/mount"), false, FPL("") }, | |
| 183 // An existing mount point path is substring. | |
| 184 { DRIVE FPL("/a/b/c1"), false, FPL("") }, | |
| 185 // No leading /. | |
| 186 { DRIVE FPL("a/b/c"), false, FPL("") }, | |
| 187 // Sibling to a root path. | |
| 188 { DRIVE FPL("/a/b/d/e"), false, FPL("") }, | |
| 189 // Sibling to a root path. | |
| 190 { DRIVE FPL("/z/y/v/u"), false, FPL("") }, | |
| 191 // Sibling to a root path. | |
| 192 { DRIVE FPL("/m/n/p/q"), false, FPL("") }, | |
| 193 // Mount point root path. | |
| 194 { DRIVE FPL("/a/b/c"), true, FPL("c") }, | |
| 195 // Mount point root path. | |
| 196 { DRIVE FPL("/z/y/x"), true, FPL("x") }, | |
| 197 // Mount point root path. | |
| 198 { DRIVE FPL("/m/n/o"), true, FPL("o") }, | |
| 199 // Mount point child path. | |
| 200 { DRIVE FPL("/a/b/c/d/e"), true, FPL("c/d/e") }, | |
| 201 // Mount point child path. | |
| 202 { DRIVE FPL("/z/y/x/v/u"), true, FPL("x/v/u") }, | |
| 203 // Mount point child path. | |
| 204 { DRIVE FPL("/m/n/o/p/q"), true, FPL("o/p/q") }, | |
| 205 // Name doesn't match mount point path base name. | |
| 206 { DRIVE FPL("/root/foo/a/b/c"), true, FPL("mount/a/b/c") }, | |
| 207 { DRIVE FPL("/root/foo"), true, FPL("mount") }, | |
| 208 // Mount point contains character whose ASCII code is smaller than file path | |
| 209 // separator's. | |
| 210 { DRIVE FPL("/a/b/c(1)/d/e"), true, FPL("c(1)/d/e") }, | |
| 211 #if defined(FILE_PATH_USES_WIN_SEPARATORS) | |
| 212 // Path with win separators mixed in. | |
| 213 { DRIVE FPL("/a\\b\\c/d"), true, FPL("c/d") }, | |
| 214 #endif | |
| 215 }; | |
| 216 | |
| 217 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 218 // Initialize virtual path with a value. | |
| 219 base::FilePath virtual_path(DRIVE FPL("/mount")); | |
| 220 base::FilePath local_path(kTestCases[i].local_path); | |
| 221 EXPECT_EQ(kTestCases[i].success, | |
| 222 mount_points->GetVirtualPath(local_path, &virtual_path)) | |
| 223 << "Resolving " << kTestCases[i].local_path; | |
| 224 | |
| 225 // There are no guarantees for |virtual_path| value if |GetVirtualPath| | |
| 226 // fails. | |
| 227 if (!kTestCases[i].success) | |
| 228 continue; | |
| 229 | |
| 230 base::FilePath expected_virtual_path(kTestCases[i].virtual_path); | |
| 231 EXPECT_EQ(expected_virtual_path.NormalizePathSeparators(), virtual_path) | |
| 232 << "Resolving " << kTestCases[i].local_path; | |
| 233 } | |
| 234 } | |
| 235 | |
| 236 TEST(ExternalMountPointsTest, HandlesFileSystemMountType) { | |
| 237 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 238 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 239 | |
| 240 const GURL test_origin("http://chromium.org"); | |
| 241 const base::FilePath test_path(FPL("/mount")); | |
| 242 | |
| 243 // Should handle External File System. | |
| 244 EXPECT_TRUE(mount_points->HandlesFileSystemMountType( | |
| 245 fileapi::kFileSystemTypeExternal)); | |
| 246 | |
| 247 // Shouldn't handle the rest. | |
| 248 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 249 fileapi::kFileSystemTypeIsolated)); | |
| 250 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 251 fileapi::kFileSystemTypeTemporary)); | |
| 252 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 253 fileapi::kFileSystemTypePersistent)); | |
| 254 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 255 fileapi::kFileSystemTypeTest)); | |
| 256 // Not even if it's external subtype. | |
| 257 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 258 fileapi::kFileSystemTypeNativeLocal)); | |
| 259 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 260 fileapi::kFileSystemTypeRestrictedNativeLocal)); | |
| 261 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 262 fileapi::kFileSystemTypeDrive)); | |
| 263 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( | |
| 264 fileapi::kFileSystemTypeSyncable)); | |
| 265 } | |
| 266 | |
| 267 TEST(ExternalMountPointsTest, CreateCrackedFileSystemURL) { | |
| 268 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 269 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 270 | |
| 271 const GURL kTestOrigin("http://chromium.org"); | |
| 272 | |
| 273 mount_points->RegisterFileSystem("c", | |
| 274 fileapi::kFileSystemTypeNativeLocal, | |
| 275 fileapi::FileSystemMountOption(), | |
| 276 base::FilePath(DRIVE FPL("/a/b/c"))); | |
| 277 mount_points->RegisterFileSystem("c(1)", | |
| 278 fileapi::kFileSystemTypeDrive, | |
| 279 fileapi::FileSystemMountOption(), | |
| 280 base::FilePath(DRIVE FPL("/a/b/c(1)"))); | |
| 281 mount_points->RegisterFileSystem("empty_path", | |
| 282 fileapi::kFileSystemTypeSyncable, | |
| 283 fileapi::FileSystemMountOption(), | |
| 284 base::FilePath()); | |
| 285 mount_points->RegisterFileSystem("mount", | |
| 286 fileapi::kFileSystemTypeDrive, | |
| 287 fileapi::FileSystemMountOption(), | |
| 288 base::FilePath(DRIVE FPL("/root"))); | |
| 289 | |
| 290 // Try cracking invalid GURL. | |
| 291 FileSystemURL invalid = mount_points->CrackURL(GURL("http://chromium.og")); | |
| 292 EXPECT_FALSE(invalid.is_valid()); | |
| 293 | |
| 294 // Try cracking isolated path. | |
| 295 FileSystemURL isolated = mount_points->CreateCrackedFileSystemURL( | |
| 296 kTestOrigin, fileapi::kFileSystemTypeIsolated, base::FilePath(FPL("c"))); | |
| 297 EXPECT_FALSE(isolated.is_valid()); | |
| 298 | |
| 299 // Try native local which is not cracked. | |
| 300 FileSystemURL native_local = mount_points->CreateCrackedFileSystemURL( | |
| 301 kTestOrigin, | |
| 302 fileapi::kFileSystemTypeNativeLocal, | |
| 303 base::FilePath(FPL("c"))); | |
| 304 EXPECT_FALSE(native_local.is_valid()); | |
| 305 | |
| 306 struct TestCase { | |
| 307 const base::FilePath::CharType* const path; | |
| 308 bool expect_valid; | |
| 309 fileapi::FileSystemType expect_type; | |
| 310 const base::FilePath::CharType* const expect_path; | |
| 311 const char* const expect_fs_id; | |
| 312 }; | |
| 313 | |
| 314 const TestCase kTestCases[] = { | |
| 315 { FPL("c/d/e"), | |
| 316 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, | |
| 317 { FPL("c(1)/d/e"), | |
| 318 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)/d/e"), "c(1)" }, | |
| 319 { FPL("c(1)"), | |
| 320 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)"), "c(1)" }, | |
| 321 { FPL("empty_path/a"), | |
| 322 true, fileapi::kFileSystemTypeSyncable, FPL("a"), "empty_path" }, | |
| 323 { FPL("empty_path"), | |
| 324 true, fileapi::kFileSystemTypeSyncable, FPL(""), "empty_path" }, | |
| 325 { FPL("mount/a/b"), | |
| 326 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, | |
| 327 { FPL("mount"), | |
| 328 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root"), "mount" }, | |
| 329 { FPL("cc"), | |
| 330 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 331 { FPL(""), | |
| 332 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 333 { FPL(".."), | |
| 334 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 335 // Absolte paths. | |
| 336 { FPL("/c/d/e"), | |
| 337 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 338 { FPL("/c(1)/d/e"), | |
| 339 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 340 { FPL("/empty_path"), | |
| 341 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 342 // PAth references parent. | |
| 343 { FPL("c/d/../e"), | |
| 344 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 345 { FPL("/empty_path/a/../b"), | |
| 346 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 347 #if defined(FILE_PATH_USES_WIN_SEPARATORS) | |
| 348 { FPL("c/d\\e"), | |
| 349 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, | |
| 350 { FPL("mount\\a\\b"), | |
| 351 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, | |
| 352 #endif | |
| 353 }; | |
| 354 | |
| 355 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 356 FileSystemURL cracked = mount_points->CreateCrackedFileSystemURL( | |
| 357 kTestOrigin, | |
| 358 fileapi::kFileSystemTypeExternal, | |
| 359 base::FilePath(kTestCases[i].path)); | |
| 360 | |
| 361 EXPECT_EQ(kTestCases[i].expect_valid, cracked.is_valid()) | |
| 362 << "Test case index: " << i; | |
| 363 | |
| 364 if (!kTestCases[i].expect_valid) | |
| 365 continue; | |
| 366 | |
| 367 EXPECT_EQ(kTestOrigin, cracked.origin()) | |
| 368 << "Test case index: " << i; | |
| 369 EXPECT_EQ(kTestCases[i].expect_type, cracked.type()) | |
| 370 << "Test case index: " << i; | |
| 371 EXPECT_EQ(base::FilePath( | |
| 372 kTestCases[i].expect_path).NormalizePathSeparators(), cracked.path()) | |
| 373 << "Test case index: " << i; | |
| 374 EXPECT_EQ(base::FilePath(kTestCases[i].path).NormalizePathSeparators(), | |
| 375 cracked.virtual_path()) | |
| 376 << "Test case index: " << i; | |
| 377 EXPECT_EQ(kTestCases[i].expect_fs_id, cracked.filesystem_id()) | |
| 378 << "Test case index: " << i; | |
| 379 EXPECT_EQ(fileapi::kFileSystemTypeExternal, cracked.mount_type()) | |
| 380 << "Test case index: " << i; | |
| 381 } | |
| 382 } | |
| 383 | |
| 384 TEST(ExternalMountPointsTest, CrackVirtualPath) { | |
| 385 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 386 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 387 | |
| 388 const GURL kTestOrigin("http://chromium.org"); | |
| 389 | |
| 390 mount_points->RegisterFileSystem("c", | |
| 391 fileapi::kFileSystemTypeNativeLocal, | |
| 392 fileapi::FileSystemMountOption(), | |
| 393 base::FilePath(DRIVE FPL("/a/b/c"))); | |
| 394 mount_points->RegisterFileSystem("c(1)", | |
| 395 fileapi::kFileSystemTypeDrive, | |
| 396 fileapi::FileSystemMountOption(), | |
| 397 base::FilePath(DRIVE FPL("/a/b/c(1)"))); | |
| 398 mount_points->RegisterFileSystem("empty_path", | |
| 399 fileapi::kFileSystemTypeSyncable, | |
| 400 fileapi::FileSystemMountOption(), | |
| 401 base::FilePath()); | |
| 402 mount_points->RegisterFileSystem("mount", | |
| 403 fileapi::kFileSystemTypeDrive, | |
| 404 fileapi::FileSystemMountOption(), | |
| 405 base::FilePath(DRIVE FPL("/root"))); | |
| 406 | |
| 407 struct TestCase { | |
| 408 const base::FilePath::CharType* const path; | |
| 409 bool expect_valid; | |
| 410 fileapi::FileSystemType expect_type; | |
| 411 const base::FilePath::CharType* const expect_path; | |
| 412 const char* const expect_name; | |
| 413 }; | |
| 414 | |
| 415 const TestCase kTestCases[] = { | |
| 416 { FPL("c/d/e"), | |
| 417 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, | |
| 418 { FPL("c(1)/d/e"), | |
| 419 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)/d/e"), "c(1)" }, | |
| 420 { FPL("c(1)"), | |
| 421 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)"), "c(1)" }, | |
| 422 { FPL("empty_path/a"), | |
| 423 true, fileapi::kFileSystemTypeSyncable, FPL("a"), "empty_path" }, | |
| 424 { FPL("empty_path"), | |
| 425 true, fileapi::kFileSystemTypeSyncable, FPL(""), "empty_path" }, | |
| 426 { FPL("mount/a/b"), | |
| 427 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, | |
| 428 { FPL("mount"), | |
| 429 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root"), "mount" }, | |
| 430 { FPL("cc"), | |
| 431 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 432 { FPL(""), | |
| 433 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 434 { FPL(".."), | |
| 435 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 436 // Absolte paths. | |
| 437 { FPL("/c/d/e"), | |
| 438 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 439 { FPL("/c(1)/d/e"), | |
| 440 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 441 { FPL("/empty_path"), | |
| 442 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 443 // PAth references parent. | |
| 444 { FPL("c/d/../e"), | |
| 445 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 446 { FPL("/empty_path/a/../b"), | |
| 447 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, | |
| 448 #if defined(FILE_PATH_USES_WIN_SEPARATORS) | |
| 449 { FPL("c/d\\e"), | |
| 450 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, | |
| 451 { FPL("mount\\a\\b"), | |
| 452 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, | |
| 453 #endif | |
| 454 }; | |
| 455 | |
| 456 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 457 std::string cracked_name; | |
| 458 fileapi::FileSystemType cracked_type; | |
| 459 base::FilePath cracked_path; | |
| 460 fileapi::FileSystemMountOption cracked_option; | |
| 461 EXPECT_EQ(kTestCases[i].expect_valid, | |
| 462 mount_points->CrackVirtualPath(base::FilePath(kTestCases[i].path), | |
| 463 &cracked_name, &cracked_type, &cracked_path, &cracked_option)) | |
| 464 << "Test case index: " << i; | |
| 465 | |
| 466 if (!kTestCases[i].expect_valid) | |
| 467 continue; | |
| 468 | |
| 469 EXPECT_EQ(kTestCases[i].expect_type, cracked_type) | |
| 470 << "Test case index: " << i; | |
| 471 EXPECT_EQ(base::FilePath( | |
| 472 kTestCases[i].expect_path).NormalizePathSeparators(), cracked_path) | |
| 473 << "Test case index: " << i; | |
| 474 EXPECT_EQ(kTestCases[i].expect_name, cracked_name) | |
| 475 << "Test case index: " << i; | |
| 476 } | |
| 477 } | |
| 478 | |
| 479 TEST(ExternalMountPointsTest, MountOption) { | |
| 480 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 481 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 482 | |
| 483 mount_points->RegisterFileSystem( | |
| 484 "nosync", | |
| 485 fileapi::kFileSystemTypeNativeLocal, | |
| 486 fileapi::FileSystemMountOption(fileapi::COPY_SYNC_OPTION_NO_SYNC), | |
| 487 base::FilePath(DRIVE FPL("/nosync"))); | |
| 488 mount_points->RegisterFileSystem( | |
| 489 "sync", | |
| 490 fileapi::kFileSystemTypeNativeLocal, | |
| 491 fileapi::FileSystemMountOption(fileapi::COPY_SYNC_OPTION_SYNC), | |
| 492 base::FilePath(DRIVE FPL("/sync"))); | |
| 493 | |
| 494 std::string name; | |
| 495 fileapi::FileSystemType type; | |
| 496 fileapi::FileSystemMountOption option; | |
| 497 base::FilePath path; | |
| 498 EXPECT_TRUE(mount_points->CrackVirtualPath( | |
| 499 base::FilePath(FPL("nosync/file")), &name, &type, &path, &option)); | |
| 500 EXPECT_EQ(fileapi::COPY_SYNC_OPTION_NO_SYNC, option.copy_sync_option()); | |
| 501 EXPECT_TRUE(mount_points->CrackVirtualPath( | |
| 502 base::FilePath(FPL("sync/file")), &name, &type, &path, &option)); | |
| 503 EXPECT_EQ(fileapi::COPY_SYNC_OPTION_SYNC, option.copy_sync_option()); | |
| 504 } | |
| 505 | |
| 506 } // namespace | |
| 507 | |
| OLD | NEW |