Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(210)

Unified Diff: content/browser/child_process_security_policy_unittest.cc

Issue 442383002: Move storage-related files from webkit/ to new top-level directory storage/ (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: . Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/browser/child_process_security_policy_unittest.cc
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc
index 97c1889b3d7875f5116f1af86a0ecccb3e686457..fb2117806ffac4084a3f5454e98e1d22ed636dee 100644
--- a/content/browser/child_process_security_policy_unittest.cc
+++ b/content/browser/child_process_security_policy_unittest.cc
@@ -12,10 +12,10 @@
#include "content/test/test_content_browser_client.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "url/gurl.h"
-#include "webkit/browser/fileapi/file_permission_policy.h"
-#include "webkit/browser/fileapi/file_system_url.h"
-#include "webkit/browser/fileapi/isolated_context.h"
-#include "webkit/common/fileapi/file_system_types.h"
+#include "storage/browser/fileapi/file_permission_policy.h"
+#include "storage/browser/fileapi/file_system_url.h"
+#include "storage/browser/fileapi/isolated_context.h"
+#include "storage/common/fileapi/file_system_types.h"
namespace content {
namespace {
@@ -98,7 +98,7 @@ class ChildProcessSecurityPolicyTest : public testing::Test {
void CheckHasNoFileSystemFilePermission(ChildProcessSecurityPolicyImpl* p,
const base::FilePath& file,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
EXPECT_FALSE(p->CanReadFile(kRendererID, file));
EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, file));
EXPECT_FALSE(p->CanReadFileSystemFile(kRendererID, url));
@@ -308,22 +308,24 @@ TEST_F(ChildProcessSecurityPolicyTest, FileSystemGrantsTest) {
ChildProcessSecurityPolicyImpl::GetInstance();
p->Add(kRendererID);
- std::string read_id = fileapi::IsolatedContext::GetInstance()->
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest,
- "read_filesystem",
- base::FilePath());
- std::string read_write_id = fileapi::IsolatedContext::GetInstance()->
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest,
- "read_write_filesystem",
- base::FilePath());
- std::string copy_into_id = fileapi::IsolatedContext::GetInstance()->
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest,
- "copy_into_filesystem",
- base::FilePath());
- std::string delete_from_id = fileapi::IsolatedContext::GetInstance()->
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest,
- "delete_from_filesystem",
- base::FilePath());
+ std::string read_id =
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath(
+ storage::kFileSystemTypeTest, "read_filesystem", base::FilePath());
+ std::string read_write_id =
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath(
+ storage::kFileSystemTypeTest,
+ "read_write_filesystem",
+ base::FilePath());
+ std::string copy_into_id =
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath(
+ storage::kFileSystemTypeTest,
+ "copy_into_filesystem",
+ base::FilePath());
+ std::string delete_from_id =
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath(
+ storage::kFileSystemTypeTest,
+ "delete_from_filesystem",
+ base::FilePath());
// Test initially having no permissions.
CheckHasNoFileSystemPermission(p, read_id);
@@ -373,10 +375,10 @@ TEST_F(ChildProcessSecurityPolicyTest, FileSystemGrantsTest) {
// Cleanup.
p->Remove(kRendererID);
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(read_id);
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(read_write_id);
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(copy_into_id);
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(delete_from_id);
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(read_id);
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(read_write_id);
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(copy_into_id);
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(delete_from_id);
}
TEST_F(ChildProcessSecurityPolicyTest, FilePermissionGrantingAndRevoking) {
@@ -384,14 +386,14 @@ TEST_F(ChildProcessSecurityPolicyTest, FilePermissionGrantingAndRevoking) {
ChildProcessSecurityPolicyImpl::GetInstance();
p->RegisterFileSystemPermissionPolicy(
- fileapi::kFileSystemTypeTest,
- fileapi::FILE_PERMISSION_USE_FILE_PERMISSION);
+ storage::kFileSystemTypeTest,
+ storage::FILE_PERMISSION_USE_FILE_PERMISSION);
p->Add(kRendererID);
base::FilePath file(TEST_PATH("/dir/testfile"));
file = file.NormalizePathSeparators();
- fileapi::FileSystemURL url = fileapi::FileSystemURL::CreateForTest(
- GURL("http://foo/"), fileapi::kFileSystemTypeTest, file);
+ storage::FileSystemURL url = storage::FileSystemURL::CreateForTest(
+ GURL("http://foo/"), storage::kFileSystemTypeTest, file);
// Test initially having no permissions.
CheckHasNoFileSystemFilePermission(p, file, url);
« no previous file with comments | « content/browser/child_process_security_policy_impl.cc ('k') | content/browser/database_quota_client_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698