Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(243)

Side by Side Diff: content/browser/fileapi/obfuscated_file_util_unittest.cc

Issue 678073006: Standardize usage of virtual/override/final specifiers. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix bogus formatting Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <set> 5 #include <set>
6 #include <string> 6 #include <string>
7 #include <vector> 7 #include <vector>
8 8
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/files/file.h" 10 #include "base/files/file.h"
(...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after
144 class ObfuscatedFileUtilTest : public testing::Test { 144 class ObfuscatedFileUtilTest : public testing::Test {
145 public: 145 public:
146 ObfuscatedFileUtilTest() 146 ObfuscatedFileUtilTest()
147 : origin_(GURL("http://www.example.com")), 147 : origin_(GURL("http://www.example.com")),
148 type_(storage::kFileSystemTypeTemporary), 148 type_(storage::kFileSystemTypeTemporary),
149 weak_factory_(this), 149 weak_factory_(this),
150 sandbox_file_system_(origin_, type_), 150 sandbox_file_system_(origin_, type_),
151 quota_status_(storage::kQuotaStatusUnknown), 151 quota_status_(storage::kQuotaStatusUnknown),
152 usage_(-1) {} 152 usage_(-1) {}
153 153
154 virtual void SetUp() { 154 void SetUp() override {
155 ASSERT_TRUE(data_dir_.CreateUniqueTempDir()); 155 ASSERT_TRUE(data_dir_.CreateUniqueTempDir());
156 156
157 storage_policy_ = new MockSpecialStoragePolicy(); 157 storage_policy_ = new MockSpecialStoragePolicy();
158 158
159 quota_manager_ = 159 quota_manager_ =
160 new storage::QuotaManager(false /* is_incognito */, 160 new storage::QuotaManager(false /* is_incognito */,
161 data_dir_.path(), 161 data_dir_.path(),
162 base::MessageLoopProxy::current().get(), 162 base::MessageLoopProxy::current().get(),
163 base::MessageLoopProxy::current().get(), 163 base::MessageLoopProxy::current().get(),
164 storage_policy_.get()); 164 storage_policy_.get());
165 165
166 // Every time we create a new sandbox_file_system helper, 166 // Every time we create a new sandbox_file_system helper,
167 // it creates another context, which creates another path manager, 167 // it creates another context, which creates another path manager,
168 // another sandbox_backend, and another OFU. 168 // another sandbox_backend, and another OFU.
169 // We need to pass in the context to skip all that. 169 // We need to pass in the context to skip all that.
170 file_system_context_ = CreateFileSystemContextForTesting( 170 file_system_context_ = CreateFileSystemContextForTesting(
171 quota_manager_->proxy(), 171 quota_manager_->proxy(),
172 data_dir_.path()); 172 data_dir_.path());
173 173
174 sandbox_file_system_.SetUp(file_system_context_.get()); 174 sandbox_file_system_.SetUp(file_system_context_.get());
175 175
176 change_observers_ = 176 change_observers_ =
177 storage::MockFileChangeObserver::CreateList(&change_observer_); 177 storage::MockFileChangeObserver::CreateList(&change_observer_);
178 } 178 }
179 179
180 virtual void TearDown() { 180 void TearDown() override {
181 quota_manager_ = NULL; 181 quota_manager_ = NULL;
182 sandbox_file_system_.TearDown(); 182 sandbox_file_system_.TearDown();
183 } 183 }
184 184
185 scoped_ptr<FileSystemOperationContext> LimitedContext( 185 scoped_ptr<FileSystemOperationContext> LimitedContext(
186 int64 allowed_bytes_growth) { 186 int64 allowed_bytes_growth) {
187 scoped_ptr<FileSystemOperationContext> context( 187 scoped_ptr<FileSystemOperationContext> context(
188 sandbox_file_system_.NewOperationContext()); 188 sandbox_file_system_.NewOperationContext());
189 context->set_allowed_bytes_growth(allowed_bytes_growth); 189 context->set_allowed_bytes_growth(allowed_bytes_growth);
190 return context.Pass(); 190 return context.Pass();
(...skipping 2252 matching lines...) Expand 10 before | Expand all | Expand 10 after
2443 false /* exclusive */, 2443 false /* exclusive */,
2444 true /* recursive */)); 2444 true /* recursive */));
2445 ASSERT_EQ(base::File::FILE_ERROR_NOT_A_DIRECTORY, 2445 ASSERT_EQ(base::File::FILE_ERROR_NOT_A_DIRECTORY,
2446 ofu()->CreateDirectory(UnlimitedContext().get(), 2446 ofu()->CreateDirectory(UnlimitedContext().get(),
2447 path_in_file_in_file, 2447 path_in_file_in_file,
2448 false /* exclusive */, 2448 false /* exclusive */,
2449 true /* recursive */)); 2449 true /* recursive */));
2450 } 2450 }
2451 2451
2452 } // namespace content 2452 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698