Index: content/browser/child_process_security_policy_unittest.cc |
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc |
index 97c1889b3d7875f5116f1af86a0ecccb3e686457..fb2117806ffac4084a3f5454e98e1d22ed636dee 100644 |
--- a/content/browser/child_process_security_policy_unittest.cc |
+++ b/content/browser/child_process_security_policy_unittest.cc |
@@ -12,10 +12,10 @@ |
#include "content/test/test_content_browser_client.h" |
#include "testing/gtest/include/gtest/gtest.h" |
#include "url/gurl.h" |
-#include "webkit/browser/fileapi/file_permission_policy.h" |
-#include "webkit/browser/fileapi/file_system_url.h" |
-#include "webkit/browser/fileapi/isolated_context.h" |
-#include "webkit/common/fileapi/file_system_types.h" |
+#include "storage/browser/fileapi/file_permission_policy.h" |
+#include "storage/browser/fileapi/file_system_url.h" |
+#include "storage/browser/fileapi/isolated_context.h" |
+#include "storage/common/fileapi/file_system_types.h" |
namespace content { |
namespace { |
@@ -98,7 +98,7 @@ class ChildProcessSecurityPolicyTest : public testing::Test { |
void CheckHasNoFileSystemFilePermission(ChildProcessSecurityPolicyImpl* p, |
const base::FilePath& file, |
- const fileapi::FileSystemURL& url) { |
+ const storage::FileSystemURL& url) { |
EXPECT_FALSE(p->CanReadFile(kRendererID, file)); |
EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, file)); |
EXPECT_FALSE(p->CanReadFileSystemFile(kRendererID, url)); |
@@ -308,22 +308,24 @@ TEST_F(ChildProcessSecurityPolicyTest, FileSystemGrantsTest) { |
ChildProcessSecurityPolicyImpl::GetInstance(); |
p->Add(kRendererID); |
- std::string read_id = fileapi::IsolatedContext::GetInstance()-> |
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest, |
- "read_filesystem", |
- base::FilePath()); |
- std::string read_write_id = fileapi::IsolatedContext::GetInstance()-> |
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest, |
- "read_write_filesystem", |
- base::FilePath()); |
- std::string copy_into_id = fileapi::IsolatedContext::GetInstance()-> |
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest, |
- "copy_into_filesystem", |
- base::FilePath()); |
- std::string delete_from_id = fileapi::IsolatedContext::GetInstance()-> |
- RegisterFileSystemForVirtualPath(fileapi::kFileSystemTypeTest, |
- "delete_from_filesystem", |
- base::FilePath()); |
+ std::string read_id = |
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath( |
+ storage::kFileSystemTypeTest, "read_filesystem", base::FilePath()); |
+ std::string read_write_id = |
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath( |
+ storage::kFileSystemTypeTest, |
+ "read_write_filesystem", |
+ base::FilePath()); |
+ std::string copy_into_id = |
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath( |
+ storage::kFileSystemTypeTest, |
+ "copy_into_filesystem", |
+ base::FilePath()); |
+ std::string delete_from_id = |
+ storage::IsolatedContext::GetInstance()->RegisterFileSystemForVirtualPath( |
+ storage::kFileSystemTypeTest, |
+ "delete_from_filesystem", |
+ base::FilePath()); |
// Test initially having no permissions. |
CheckHasNoFileSystemPermission(p, read_id); |
@@ -373,10 +375,10 @@ TEST_F(ChildProcessSecurityPolicyTest, FileSystemGrantsTest) { |
// Cleanup. |
p->Remove(kRendererID); |
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(read_id); |
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(read_write_id); |
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(copy_into_id); |
- fileapi::IsolatedContext::GetInstance()->RevokeFileSystem(delete_from_id); |
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(read_id); |
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(read_write_id); |
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(copy_into_id); |
+ storage::IsolatedContext::GetInstance()->RevokeFileSystem(delete_from_id); |
} |
TEST_F(ChildProcessSecurityPolicyTest, FilePermissionGrantingAndRevoking) { |
@@ -384,14 +386,14 @@ TEST_F(ChildProcessSecurityPolicyTest, FilePermissionGrantingAndRevoking) { |
ChildProcessSecurityPolicyImpl::GetInstance(); |
p->RegisterFileSystemPermissionPolicy( |
- fileapi::kFileSystemTypeTest, |
- fileapi::FILE_PERMISSION_USE_FILE_PERMISSION); |
+ storage::kFileSystemTypeTest, |
+ storage::FILE_PERMISSION_USE_FILE_PERMISSION); |
p->Add(kRendererID); |
base::FilePath file(TEST_PATH("/dir/testfile")); |
file = file.NormalizePathSeparators(); |
- fileapi::FileSystemURL url = fileapi::FileSystemURL::CreateForTest( |
- GURL("http://foo/"), fileapi::kFileSystemTypeTest, file); |
+ storage::FileSystemURL url = storage::FileSystemURL::CreateForTest( |
+ GURL("http://foo/"), storage::kFileSystemTypeTest, file); |
// Test initially having no permissions. |
CheckHasNoFileSystemFilePermission(p, file, url); |