summaryrefslogtreecommitdiffstats
path: root/content
diff options
context:
space:
mode:
authorbrettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-02-16 06:26:31 +0000
committerbrettw@chromium.org <brettw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-02-16 06:26:31 +0000
commitc42de73d768e53ea90903357ced6ef6001fb7b2f (patch)
treee3df82e3ce2194a069f5c26c0784ed56cb26b231 /content
parenta6ba33f4132b66b3e11d26f43eecde12e5a0bbc9 (diff)
downloadchromium_src-c42de73d768e53ea90903357ced6ef6001fb7b2f.zip
chromium_src-c42de73d768e53ea90903357ced6ef6001fb7b2f.tar.gz
chromium_src-c42de73d768e53ea90903357ced6ef6001fb7b2f.tar.bz2
Replace all FilePath with base::FilePath in content.
This is im preparation for removing the 'using" in file_path.h Review URL: https://codereview.chromium.org/12226120 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182940 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content')
-rw-r--r--content/browser/child_process_security_policy_unittest.cc22
-rw-r--r--content/browser/download/file_metadata_mac.mm2
-rw-r--r--content/browser/renderer_host/pepper/pepper_flash_file_message_filter.h2
-rw-r--r--content/public/browser/content_browser_client.cc10
-rw-r--r--content/public/browser/content_browser_client.h6
-rw-r--r--content/public/browser/devtools_http_handler_delegate.h2
-rw-r--r--content/public/browser/download_item.h12
-rw-r--r--content/public/browser/download_manager.h4
-rw-r--r--content/public/browser/download_manager_delegate.cc2
-rw-r--r--content/public/browser/download_manager_delegate.h23
-rw-r--r--content/public/browser/download_save_info.h2
-rw-r--r--content/public/browser/download_url_parameters.h4
-rw-r--r--content/public/browser/indexed_db_context.h3
-rw-r--r--content/public/browser/plugin_service_filter.h2
-rw-r--r--content/public/browser/storage_partition.h2
-rw-r--r--content/public/browser/web_contents.h11
-rw-r--r--content/public/browser/web_contents_delegate.cc2
-rw-r--r--content/public/browser/web_contents_observer.h4
-rw-r--r--content/public/common/content_constants.cc4
-rw-r--r--content/public/common/content_constants.h4
-rw-r--r--content/public/common/file_chooser_params.h2
-rw-r--r--content/public/common/pepper_plugin_info.h2
-rw-r--r--content/public/test/browser_test_base.cc2
-rw-r--r--content/public/test/browser_test_utils.cc2
-rw-r--r--content/public/test/browser_test_utils.h3
-rw-r--r--content/public/test/mock_download_item.h12
-rw-r--r--content/public/test/mock_download_manager.cc8
-rw-r--r--content/public/test/mock_download_manager.h12
-rw-r--r--content/public/test/render_widget_test.cc2
-rw-r--r--content/public/test/render_widget_test.h3
-rw-r--r--content/public/test/test_browser_context.cc6
-rw-r--r--content/public/test/test_browser_context.h6
-rw-r--r--content/public/test/test_file_error_injector.cc20
-rw-r--r--content/public/test/test_launcher.cc19
-rw-r--r--content/renderer/gpu/gpu_benchmarking_extension.cc8
-rw-r--r--content/renderer/hyphenator/hyphenator_unittest.cc4
-rw-r--r--content/renderer/pepper/pepper_file_chooser_host.cc4
-rw-r--r--content/renderer/pepper/pepper_file_chooser_host_unittest.cc4
-rw-r--r--content/renderer/pepper/pepper_file_io_host.cc2
-rw-r--r--content/renderer/pepper/pepper_hung_plugin_filter.cc7
-rw-r--r--content/renderer/pepper/pepper_hung_plugin_filter.h4
-rw-r--r--content/renderer/pepper/pepper_plugin_delegate_impl.cc16
-rw-r--r--content/renderer/pepper/renderer_ppapi_host_impl.cc2
-rw-r--r--content/renderer/render_thread_impl.cc2
-rw-r--r--content/renderer/render_view_impl.cc12
-rw-r--r--content/renderer/render_view_impl.h14
-rw-r--r--content/renderer/renderer_main_platform_delegate_linux.cc2
-rw-r--r--content/renderer/renderer_webkitplatformsupport_impl.cc4
-rw-r--r--content/shell/android/browsertests_apk/content_browser_tests_android.cc5
-rw-r--r--content/shell/paths_mac.mm2
-rw-r--r--content/shell/shell_browser_context.h2
-rw-r--r--content/shell/shell_content_browser_client.cc2
-rw-r--r--content/shell/shell_content_browser_client.h2
53 files changed, 166 insertions, 154 deletions
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc
index 2a6a381..da56188 100644
--- a/content/browser/child_process_security_policy_unittest.cc
+++ b/content/browser/child_process_security_policy_unittest.cc
@@ -354,20 +354,22 @@ TEST_F(ChildProcessSecurityPolicyTest, CanReadDirectories) {
}
TEST_F(ChildProcessSecurityPolicyTest, FilePermissions) {
- base::FilePath granted_file = FilePath(TEST_PATH("/home/joe"));
- base::FilePath sibling_file = FilePath(TEST_PATH("/home/bob"));
- base::FilePath child_file = FilePath(TEST_PATH("/home/joe/file"));
- base::FilePath parent_file = FilePath(TEST_PATH("/home"));
- base::FilePath parent_slash_file = FilePath(TEST_PATH("/home/"));
- base::FilePath child_traversal1 = FilePath(TEST_PATH("/home/joe/././file"));
- base::FilePath child_traversal2 = FilePath(
+ base::FilePath granted_file = base::FilePath(TEST_PATH("/home/joe"));
+ base::FilePath sibling_file = base::FilePath(TEST_PATH("/home/bob"));
+ base::FilePath child_file = base::FilePath(TEST_PATH("/home/joe/file"));
+ base::FilePath parent_file = base::FilePath(TEST_PATH("/home"));
+ base::FilePath parent_slash_file = base::FilePath(TEST_PATH("/home/"));
+ base::FilePath child_traversal1 =
+ base::FilePath(TEST_PATH("/home/joe/././file"));
+ base::FilePath child_traversal2 = base::FilePath(
TEST_PATH("/home/joe/file/../otherfile"));
base::FilePath evil_traversal1 =
FilePath(TEST_PATH("/home/joe/../../etc/passwd"));
- base::FilePath evil_traversal2 = FilePath(
+ base::FilePath evil_traversal2 = base::FilePath(
TEST_PATH("/home/joe/./.././../etc/passwd"));
- base::FilePath self_traversal = FilePath(TEST_PATH("/home/joe/../joe/file"));
- base::FilePath relative_file = FilePath(FILE_PATH_LITERAL("home/joe"));
+ base::FilePath self_traversal =
+ base::FilePath(TEST_PATH("/home/joe/../joe/file"));
+ base::FilePath relative_file = base::FilePath(FILE_PATH_LITERAL("home/joe"));
ChildProcessSecurityPolicyImpl* p =
ChildProcessSecurityPolicyImpl::GetInstance();
diff --git a/content/browser/download/file_metadata_mac.mm b/content/browser/download/file_metadata_mac.mm
index d16edf2..0a45cdb 100644
--- a/content/browser/download/file_metadata_mac.mm
+++ b/content/browser/download/file_metadata_mac.mm
@@ -96,7 +96,7 @@ void AddOriginMetadataToFile(const base::FilePath& file, const GURL& source,
// LSFileQuarantineEnabled entry in our Info.plist, but it knows relatively
// little about the files. We add more information about the download to
// improve the UI shown by the OS when the users tries to open the file.
-void AddQuarantineMetadataToFile(const FilePath& file, const GURL& source,
+void AddQuarantineMetadataToFile(const base::FilePath& file, const GURL& source,
const GURL& referrer) {
FSRef file_ref;
if (!base::mac::FSRefFromPath(file.value(), &file_ref))
diff --git a/content/browser/renderer_host/pepper/pepper_flash_file_message_filter.h b/content/browser/renderer_host/pepper/pepper_flash_file_message_filter.h
index 3845528..7863680 100644
--- a/content/browser/renderer_host/pepper/pepper_flash_file_message_filter.h
+++ b/content/browser/renderer_host/pepper/pepper_flash_file_message_filter.h
@@ -70,7 +70,7 @@ class PepperFlashFileMessageFilter : public ppapi::host::ResourceMessageFilter {
const ppapi::PepperFilePath& pepper_path,
int flags);
- FilePath plugin_data_directory_;
+ base::FilePath plugin_data_directory_;
int render_process_id_;
base::ProcessHandle plugin_process_handle_;
diff --git a/content/public/browser/content_browser_client.cc b/content/public/browser/content_browser_client.cc
index 2b16e49..98e0364 100644
--- a/content/public/browser/content_browser_client.cc
+++ b/content/public/browser/content_browser_client.cc
@@ -54,7 +54,7 @@ net::URLRequestContextGetter* ContentBrowserClient::CreateRequestContext(
net::URLRequestContextGetter*
ContentBrowserClient::CreateRequestContextForStoragePartition(
BrowserContext* browser_context,
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory,
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
blob_protocol_handler,
@@ -246,8 +246,8 @@ bool ContentBrowserClient::IsFastShutdownPossible() {
return true;
}
-FilePath ContentBrowserClient::GetDefaultDownloadDirectory() {
- return FilePath();
+base::FilePath ContentBrowserClient::GetDefaultDownloadDirectory() {
+ return base::FilePath();
}
std::string ContentBrowserClient::GetDefaultDownloadName() {
@@ -266,8 +266,8 @@ bool ContentBrowserClient::AllowPepperSocketAPI(
return false;
}
-FilePath ContentBrowserClient::GetHyphenDictionaryDirectory() {
- return FilePath();
+base::FilePath ContentBrowserClient::GetHyphenDictionaryDirectory() {
+ return base::FilePath();
}
ui::SelectFilePolicy* ContentBrowserClient::CreateSelectFilePolicy(
diff --git a/content/public/browser/content_browser_client.h b/content/public/browser/content_browser_client.h
index 0e1ed14..273593a 100644
--- a/content/public/browser/content_browser_client.h
+++ b/content/public/browser/content_browser_client.h
@@ -159,7 +159,7 @@ class CONTENT_EXPORT ContentBrowserClient {
// TODO(ajwong): Remove once http://crbug.com/159193 is resolved.
virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition(
BrowserContext* browser_context,
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory,
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
blob_protocol_handler,
@@ -461,7 +461,7 @@ class CONTENT_EXPORT ContentBrowserClient {
// Returns the default download directory.
// This can be called on any thread.
- virtual FilePath GetDefaultDownloadDirectory();
+ virtual base::FilePath GetDefaultDownloadDirectory();
// Returns the default filename used in downloads when we have no idea what
// else we should do with the file.
@@ -483,7 +483,7 @@ class CONTENT_EXPORT ContentBrowserClient {
const SocketPermissionRequest& params);
// Returns the directory containing hyphenation dictionaries.
- virtual FilePath GetHyphenDictionaryDirectory();
+ virtual base::FilePath GetHyphenDictionaryDirectory();
// Returns an implementation of a file selecition policy. Can return NULL.
virtual ui::SelectFilePolicy* CreateSelectFilePolicy(
diff --git a/content/public/browser/devtools_http_handler_delegate.h b/content/public/browser/devtools_http_handler_delegate.h
index efc8cb9..2e3d2e2 100644
--- a/content/public/browser/devtools_http_handler_delegate.h
+++ b/content/public/browser/devtools_http_handler_delegate.h
@@ -33,7 +33,7 @@ class DevToolsHttpHandlerDelegate {
virtual bool BundlesFrontendResources() = 0;
// Returns path to the front-end files on the local filesystem for debugging.
- virtual FilePath GetDebugFrontendDir() = 0;
+ virtual base::FilePath GetDebugFrontendDir() = 0;
// Get a thumbnail for a given page. Returns non-empty string iff we have the
// thumbnail.
diff --git a/content/public/browser/download_item.h b/content/public/browser/download_item.h
index 3e29c07..e3e8d32 100644
--- a/content/public/browser/download_item.h
+++ b/content/public/browser/download_item.h
@@ -201,27 +201,27 @@ class CONTENT_EXPORT DownloadItem : public base::SupportsUserData {
// physical file, if one exists. It should be considered a hint; changes to
// this value and renames of the file on disk are not atomic with each other.
// May be empty if the in-progress path hasn't been determined yet.
- virtual const FilePath& GetFullPath() const = 0;
+ virtual const base::FilePath& GetFullPath() const = 0;
// Target path of an in-progress download. We may be downloading to a
// temporary or intermediate file (specified by GetFullPath()); this is the
// name we will use once the download completes.
// May be empty if the target path hasn't yet been determined.
- virtual const FilePath& GetTargetFilePath() const = 0;
+ virtual const base::FilePath& GetTargetFilePath() const = 0;
// If the download forced a path rather than requesting name determination,
// return the path requested.
- virtual const FilePath& GetForcedFilePath() const = 0;
+ virtual const base::FilePath& GetForcedFilePath() const = 0;
// Returns the user-verified target file path for the download.
// This returns the same path as GetTargetFilePath() for safe downloads
// but does not for dangerous downloads until the name is verified.
- virtual FilePath GetUserVerifiedFilePath() const = 0;
+ virtual base::FilePath GetUserVerifiedFilePath() const = 0;
// Returns the file-name that should be reported to the user. If a display
// name has been explicitly set using SetDisplayName(), this function returns
// that display name. Otherwise returns the final target filename.
- virtual FilePath GetFileNameToReportUser() const = 0;
+ virtual base::FilePath GetFileNameToReportUser() const = 0;
virtual TargetDisposition GetTargetDisposition() const = 0;
@@ -314,7 +314,7 @@ class CONTENT_EXPORT DownloadItem : public base::SupportsUserData {
// Set a display name for the download that will be independent of the target
// filename. If |name| is not empty, then GetFileNameToReportUser() will
// return |name|. Has no effect on the final target filename.
- virtual void SetDisplayName(const FilePath& name) = 0;
+ virtual void SetDisplayName(const base::FilePath& name) = 0;
// Debug/testing -------------------------------------------------------------
virtual std::string DebugString(bool verbose) const = 0;
diff --git a/content/public/browser/download_manager.h b/content/public/browser/download_manager.h
index 435e979..d834ab1 100644
--- a/content/public/browser/download_manager.h
+++ b/content/public/browser/download_manager.h
@@ -144,8 +144,8 @@ class CONTENT_EXPORT DownloadManager
// Called by the embedder, after creating the download manager, to let it know
// about downloads from previous runs of the browser.
virtual DownloadItem* CreateDownloadItem(
- const FilePath& current_path,
- const FilePath& target_path,
+ const base::FilePath& current_path,
+ const base::FilePath& target_path,
const std::vector<GURL>& url_chain,
const GURL& referrer_url,
const base::Time& start_time,
diff --git a/content/public/browser/download_manager_delegate.cc b/content/public/browser/download_manager_delegate.cc
index 8826b97..7a1b1f9 100644
--- a/content/public/browser/download_manager_delegate.cc
+++ b/content/public/browser/download_manager_delegate.cc
@@ -25,7 +25,7 @@ WebContents* DownloadManagerDelegate::
}
bool DownloadManagerDelegate::ShouldOpenFileBasedOnExtension(
- const FilePath& path) {
+ const base::FilePath& path) {
return false;
}
diff --git a/content/public/browser/download_manager_delegate.h b/content/public/browser/download_manager_delegate.h
index 8760321..8b41161 100644
--- a/content/public/browser/download_manager_delegate.h
+++ b/content/public/browser/download_manager_delegate.h
@@ -29,7 +29,7 @@ typedef base::Callback<void(DownloadItem*)>
// operation. If the delegate wants notification of the download item created
// in response to this operation, the SavePackageDownloadCreatedCallback will be
// non-null.
-typedef base::Callback<void(const FilePath&,
+typedef base::Callback<void(const base::FilePath&,
SavePageType,
const SavePackageDownloadCreatedCallback&)>
SavePackagePathPickedCallback;
@@ -41,10 +41,10 @@ typedef base::Callback<void(const FilePath&,
// same as |target_path|). Both |target_path| and |intermediate_path| are
// expected to in the same directory.
typedef base::Callback<void(
- const FilePath& target_path,
+ const base::FilePath& target_path,
DownloadItem::TargetDisposition disposition,
DownloadDangerType danger_type,
- const FilePath& intermediate_path)> DownloadTargetCallback;
+ const base::FilePath& intermediate_path)> DownloadTargetCallback;
// Called when a download delayed by the delegate has completed.
typedef base::Callback<void(bool)> DownloadOpenDelayedCallback;
@@ -83,7 +83,7 @@ class CONTENT_EXPORT DownloadManagerDelegate {
virtual WebContents* GetAlternativeWebContentsToNotifyForDownload();
// Tests if a file type should be opened automatically.
- virtual bool ShouldOpenFileBasedOnExtension(const FilePath& path);
+ virtual bool ShouldOpenFileBasedOnExtension(const base::FilePath& path);
// Allows the delegate to delay completion of the download. This function
// will either return true (in which case the download may complete)
@@ -107,17 +107,18 @@ class CONTENT_EXPORT DownloadManagerDelegate {
// Retrieve the directories to save html pages and downloads to.
virtual void GetSaveDir(BrowserContext* browser_context,
- FilePath* website_save_dir,
- FilePath* download_save_dir,
+ base::FilePath* website_save_dir,
+ base::FilePath* download_save_dir,
bool* skip_dir_check) {}
// Asks the user for the path to save a page. The delegate calls the callback
// to give the answer.
- virtual void ChooseSavePath(WebContents* web_contents,
- const FilePath& suggested_path,
- const FilePath::StringType& default_extension,
- bool can_save_as_complete,
- const SavePackagePathPickedCallback& callback) {
+ virtual void ChooseSavePath(
+ WebContents* web_contents,
+ const base::FilePath& suggested_path,
+ const base::FilePath::StringType& default_extension,
+ bool can_save_as_complete,
+ const SavePackagePathPickedCallback& callback) {
}
// Opens the file associated with this download.
diff --git a/content/public/browser/download_save_info.h b/content/public/browser/download_save_info.h
index cfa7c01..24ad355 100644
--- a/content/public/browser/download_save_info.h
+++ b/content/public/browser/download_save_info.h
@@ -23,7 +23,7 @@ struct CONTENT_EXPORT DownloadSaveInfo {
// If non-empty, contains the full target path of the download that has been
// determined prior to download initiation. This is considered to be a trusted
// path.
- FilePath file_path;
+ base::FilePath file_path;
// If non-empty, contains an untrusted filename suggestion. This can't contain
// a path (only a filename), and is only effective if |file_path| is empty.
diff --git a/content/public/browser/download_url_parameters.h b/content/public/browser/download_url_parameters.h
index a8e3258..e8b10eae 100644
--- a/content/public/browser/download_url_parameters.h
+++ b/content/public/browser/download_url_parameters.h
@@ -86,7 +86,7 @@ class CONTENT_EXPORT DownloadUrlParameters {
void set_callback(const OnStartedCallback& callback) {
callback_ = callback;
}
- void set_file_path(const FilePath& file_path) {
+ void set_file_path(const base::FilePath& file_path) {
save_info_.file_path = file_path;
}
void set_suggested_name(const string16& suggested_name) {
@@ -128,7 +128,7 @@ class CONTENT_EXPORT DownloadUrlParameters {
ResourceDispatcherHost* resource_dispatcher_host() const {
return resource_dispatcher_host_;
}
- const FilePath& file_path() const { return save_info_.file_path; }
+ const base::FilePath& file_path() const { return save_info_.file_path; }
const string16& suggested_name() const { return save_info_.suggested_name; }
int64 offset() const { return save_info_.offset; }
const std::string& hash_state() const { return save_info_.hash_state; }
diff --git a/content/public/browser/indexed_db_context.h b/content/public/browser/indexed_db_context.h
index 01ce269..9d87444f 100644
--- a/content/public/browser/indexed_db_context.h
+++ b/content/public/browser/indexed_db_context.h
@@ -32,7 +32,8 @@ class IndexedDBContext : public base::RefCountedThreadSafe<IndexedDBContext> {
virtual void DeleteForOrigin(const GURL& origin_url) = 0;
// Get the file name of the local storage file for the given origin.
- virtual FilePath GetFilePathForTesting(const string16& origin_id) const = 0;
+ virtual base::FilePath GetFilePathForTesting(
+ const string16& origin_id) const = 0;
protected:
friend class base::RefCountedThreadSafe<IndexedDBContext>;
diff --git a/content/public/browser/plugin_service_filter.h b/content/public/browser/plugin_service_filter.h
index f0b8bbc..e151ef9 100644
--- a/content/public/browser/plugin_service_filter.h
+++ b/content/public/browser/plugin_service_filter.h
@@ -31,7 +31,7 @@ class PluginServiceFilter {
// Whether the renderer has permission to load available |plugin|.
virtual bool CanLoadPlugin(int render_process_id,
- const FilePath& path) = 0;
+ const base::FilePath& path) = 0;
};
} // namespace content
diff --git a/content/public/browser/storage_partition.h b/content/public/browser/storage_partition.h
index 2a905d9..a0427fb 100644
--- a/content/public/browser/storage_partition.h
+++ b/content/public/browser/storage_partition.h
@@ -46,7 +46,7 @@ class DOMStorageContext;
// the cookies, localStorage, etc., that normal web renderers have access to.
class StoragePartition {
public:
- virtual FilePath GetPath() = 0;
+ virtual base::FilePath GetPath() = 0;
virtual net::URLRequestContextGetter* GetURLRequestContext() = 0;
virtual net::URLRequestContextGetter* GetMediaURLRequestContext() = 0;
virtual quota::QuotaManager* GetQuotaManager() = 0;
diff --git a/content/public/browser/web_contents.h b/content/public/browser/web_contents.h
index 819e628..1a26c89 100644
--- a/content/public/browser/web_contents.h
+++ b/content/public/browser/web_contents.h
@@ -314,15 +314,16 @@ class WebContents : public PageNavigator,
// Save page with the main HTML file path, the directory for saving resources,
// and the save type: HTML only or complete web page. Returns true if the
// saving process has been initiated successfully.
- virtual bool SavePage(const FilePath& main_file,
- const FilePath& dir_path,
+ virtual bool SavePage(const base::FilePath& main_file,
+ const base::FilePath& dir_path,
SavePageType save_type) = 0;
// Generate an MHTML representation of the current page in the given file.
virtual void GenerateMHTML(
- const FilePath& file,
- const base::Callback<void(const FilePath& /* path to the MHTML file */,
- int64 /* size of the file */)>& callback) = 0;
+ const base::FilePath& file,
+ const base::Callback<void(
+ const base::FilePath& /* path to the MHTML file */,
+ int64 /* size of the file */)>& callback) = 0;
// Returns true if the active NavigationEntry's page_id equals page_id.
virtual bool IsActiveEntry(int32 page_id) = 0;
diff --git a/content/public/browser/web_contents_delegate.cc b/content/public/browser/web_contents_delegate.cc
index d236634..7a4409d 100644
--- a/content/public/browser/web_contents_delegate.cc
+++ b/content/public/browser/web_contents_delegate.cc
@@ -142,7 +142,7 @@ content::ColorChooser* WebContentsDelegate::OpenColorChooser(
bool WebContentsDelegate::RequestPpapiBrokerPermission(
WebContents* web_contents,
const GURL& url,
- const FilePath& plugin_path,
+ const base::FilePath& plugin_path,
const base::Callback<void(bool)>& callback) {
return false;
}
diff --git a/content/public/browser/web_contents_observer.h b/content/public/browser/web_contents_observer.h
index f58f57d..a66e428 100644
--- a/content/public/browser/web_contents_observer.h
+++ b/content/public/browser/web_contents_observer.h
@@ -209,7 +209,7 @@ class CONTENT_EXPORT WebContentsObserver : public IPC::Listener,
// this ID is supplied by the renderer, so should not be trusted. Besides, the
// corresponding process has probably died at this point. The ID may even have
// been reused by a new process.
- virtual void PluginCrashed(const FilePath& plugin_path,
+ virtual void PluginCrashed(const base::FilePath& plugin_path,
base::ProcessId plugin_pid) {}
// Notication that the given plugin has hung or become unhung. This
@@ -219,7 +219,7 @@ class CONTENT_EXPORT WebContentsObserver : public IPC::Listener,
// that this ID is supplied by the renderer, so should be validated before
// it's used for anything in case there's an exploited renderer.
virtual void PluginHungStatusChanged(int plugin_child_id,
- const FilePath& plugin_path,
+ const base::FilePath& plugin_path,
bool is_hung) {}
// Invoked when WebContents::Clone() was used to clone a WebContents.
diff --git a/content/public/common/content_constants.cc b/content/public/common/content_constants.cc
index 748888f..55b244e 100644
--- a/content/public/common/content_constants.cc
+++ b/content/public/common/content_constants.cc
@@ -5,9 +5,9 @@
#include "content/public/common/content_constants.h"
namespace content {
-const FilePath::CharType kAppCacheDirname[] =
+const base::FilePath::CharType kAppCacheDirname[] =
FILE_PATH_LITERAL("Application Cache");
-const FilePath::CharType kPepperDataDirname[] =
+const base::FilePath::CharType kPepperDataDirname[] =
FILE_PATH_LITERAL("Pepper Data");
const char kBrowserPluginMimeType[] = "application/browser-plugin";
diff --git a/content/public/common/content_constants.h b/content/public/common/content_constants.h
index 9097181..3f5af15 100644
--- a/content/public/common/content_constants.h
+++ b/content/public/common/content_constants.h
@@ -16,10 +16,10 @@ namespace content {
// The name of the directory under BrowserContext::GetPath where the AppCache is
// put.
-CONTENT_EXPORT extern const FilePath::CharType kAppCacheDirname[];
+CONTENT_EXPORT extern const base::FilePath::CharType kAppCacheDirname[];
// The name of the directory under BrowserContext::GetPath where Pepper plugin
// data is put.
-CONTENT_EXPORT extern const FilePath::CharType kPepperDataDirname[];
+CONTENT_EXPORT extern const base::FilePath::CharType kPepperDataDirname[];
// The MIME type used for the browser plugin.
CONTENT_EXPORT extern const char kBrowserPluginMimeType[];
diff --git a/content/public/common/file_chooser_params.h b/content/public/common/file_chooser_params.h
index fad4702..32261d1 100644
--- a/content/public/common/file_chooser_params.h
+++ b/content/public/common/file_chooser_params.h
@@ -40,7 +40,7 @@ struct CONTENT_EXPORT FileChooserParams {
string16 title;
// Default file name to select in the dialog.
- FilePath default_file_name;
+ base::FilePath default_file_name;
// A list of valid lower-cased MIME types or file extensions specified in an
// input element. It is used to restrict selectable files to such types.
diff --git a/content/public/common/pepper_plugin_info.h b/content/public/common/pepper_plugin_info.h
index 207295d..057b0469 100644
--- a/content/public/common/pepper_plugin_info.h
+++ b/content/public/common/pepper_plugin_info.h
@@ -34,7 +34,7 @@ struct CONTENT_EXPORT PepperPluginInfo {
// Defaults to true.
bool is_sandboxed;
- FilePath path; // Internal plugins have "internal-[name]" as path.
+ base::FilePath path; // Internal plugins have "internal-[name]" as path.
std::string name;
std::string description;
std::string version;
diff --git a/content/public/test/browser_test_base.cc b/content/public/test/browser_test_base.cc
index d0b83cd..04d6ff0 100644
--- a/content/public/test/browser_test_base.cc
+++ b/content/public/test/browser_test_base.cc
@@ -112,7 +112,7 @@ void BrowserTestBase::ProxyRunTestOnMainThreadLoop() {
RunTestOnMainThreadLoop();
}
-void BrowserTestBase::CreateTestServer(const FilePath& test_server_base) {
+void BrowserTestBase::CreateTestServer(const base::FilePath& test_server_base) {
CHECK(!test_server_.get());
test_server_.reset(new net::TestServer(
net::TestServer::TYPE_HTTP,
diff --git a/content/public/test/browser_test_utils.cc b/content/public/test/browser_test_utils.cc
index 69d0b98cd..8b8b6ba 100644
--- a/content/public/test/browser_test_utils.cc
+++ b/content/public/test/browser_test_utils.cc
@@ -192,7 +192,7 @@ void SetCookieOnIOThread(const GURL& url,
} // namespace
-GURL GetFileUrlWithQuery(const FilePath& path,
+GURL GetFileUrlWithQuery(const base::FilePath& path,
const std::string& query_string) {
GURL url = net::FilePathToFileURL(path);
if (!query_string.empty()) {
diff --git a/content/public/test/browser_test_utils.h b/content/public/test/browser_test_utils.h
index 5ae5644..b75782c 100644
--- a/content/public/test/browser_test_utils.h
+++ b/content/public/test/browser_test_utils.h
@@ -50,7 +50,8 @@ class RenderViewHost;
class WebContents;
// Generate a URL for a file path including a query string.
-GURL GetFileUrlWithQuery(const FilePath& path, const std::string& query_string);
+GURL GetFileUrlWithQuery(const base::FilePath& path,
+ const std::string& query_string);
// Waits for a load stop for the specified |web_contents|'s controller, if the
// tab is currently web_contents. Otherwise returns immediately.
diff --git a/content/public/test/mock_download_item.h b/content/public/test/mock_download_item.h
index 08f4dc3..fc75efc 100644
--- a/content/public/test/mock_download_item.h
+++ b/content/public/test/mock_download_item.h
@@ -57,11 +57,11 @@ class MockDownloadItem : public DownloadItem {
MOCK_CONST_METHOD0(GetLastModifiedTime, const std::string&());
MOCK_CONST_METHOD0(GetETag, const std::string&());
MOCK_CONST_METHOD0(IsSavePackageDownload, bool());
- MOCK_CONST_METHOD0(GetFullPath, const FilePath&());
- MOCK_CONST_METHOD0(GetTargetFilePath, const FilePath&());
- MOCK_CONST_METHOD0(GetForcedFilePath, const FilePath&());
- MOCK_CONST_METHOD0(GetUserVerifiedFilePath, FilePath());
- MOCK_CONST_METHOD0(GetFileNameToReportUser, FilePath());
+ MOCK_CONST_METHOD0(GetFullPath, const base::FilePath&());
+ MOCK_CONST_METHOD0(GetTargetFilePath, const base::FilePath&());
+ MOCK_CONST_METHOD0(GetForcedFilePath, const base::FilePath&());
+ MOCK_CONST_METHOD0(GetUserVerifiedFilePath, base::FilePath());
+ MOCK_CONST_METHOD0(GetFileNameToReportUser, base::FilePath());
MOCK_CONST_METHOD0(GetTargetDisposition, TargetDisposition());
MOCK_CONST_METHOD0(GetHash, const std::string&());
MOCK_CONST_METHOD0(GetHashState, const std::string&());
@@ -88,7 +88,7 @@ class MockDownloadItem : public DownloadItem {
MOCK_METHOD1(SetOpenWhenComplete, void(bool));
MOCK_METHOD1(SetIsTemporary, void(bool));
MOCK_METHOD1(SetOpened, void(bool));
- MOCK_METHOD1(SetDisplayName, void(const FilePath&));
+ MOCK_METHOD1(SetDisplayName, void(const base::FilePath&));
MOCK_CONST_METHOD1(DebugString, std::string(bool));
};
diff --git a/content/public/test/mock_download_manager.cc b/content/public/test/mock_download_manager.cc
index a3b9615..143ff24 100644
--- a/content/public/test/mock_download_manager.cc
+++ b/content/public/test/mock_download_manager.cc
@@ -10,8 +10,8 @@
namespace content {
MockDownloadManager::CreateDownloadItemAdapter::CreateDownloadItemAdapter(
- const FilePath& current_path,
- const FilePath& target_path,
+ const base::FilePath& current_path,
+ const base::FilePath& target_path,
const std::vector<GURL>& url_chain,
const GURL& referrer_url,
const base::Time& start_time,
@@ -79,8 +79,8 @@ DownloadItem* MockDownloadManager::StartDownload(
}
DownloadItem* MockDownloadManager::CreateDownloadItem(
- const FilePath& current_path,
- const FilePath& target_path,
+ const base::FilePath& current_path,
+ const base::FilePath& target_path,
const std::vector<GURL>& url_chain,
const GURL& referrer_url,
const base::Time& start_time,
diff --git a/content/public/test/mock_download_manager.h b/content/public/test/mock_download_manager.h
index 04cac3f..1dbbbca 100644
--- a/content/public/test/mock_download_manager.h
+++ b/content/public/test/mock_download_manager.h
@@ -26,8 +26,8 @@ class MockDownloadManager : public DownloadManager {
// Structure to make it possible to match more than 10 arguments on
// CreateDownloadItem.
struct CreateDownloadItemAdapter {
- FilePath current_path;
- FilePath target_path;
+ base::FilePath current_path;
+ base::FilePath target_path;
std::vector<GURL> url_chain;
GURL referrer_url;
base::Time start_time;
@@ -40,8 +40,8 @@ class MockDownloadManager : public DownloadManager {
bool opened;
CreateDownloadItemAdapter(
- const FilePath& current_path,
- const FilePath& target_path,
+ const base::FilePath& current_path,
+ const base::FilePath& target_path,
const std::vector<GURL>& url_chain,
const GURL& referrer_url,
const base::Time& start_time,
@@ -89,8 +89,8 @@ class MockDownloadManager : public DownloadManager {
// Redirects to mock method to get around gmock 10 argument limit.
virtual DownloadItem* CreateDownloadItem(
- const FilePath& current_path,
- const FilePath& target_path,
+ const base::FilePath& current_path,
+ const base::FilePath& target_path,
const std::vector<GURL>& url_chain,
const GURL& referrer_url,
const base::Time& start_time,
diff --git a/content/public/test/render_widget_test.cc b/content/public/test/render_widget_test.cc
index 1b805c3..564768b 100644
--- a/content/public/test/render_widget_test.cc
+++ b/content/public/test/render_widget_test.cc
@@ -131,7 +131,7 @@ bool RenderWidgetTest::ImageContainsColor(const SkBitmap& bitmap,
}
void RenderWidgetTest::OutputBitmapToFile(const SkBitmap& bitmap,
- const FilePath& file_path) {
+ const base::FilePath& file_path) {
scoped_refptr<base::RefCountedBytes> bitmap_data(new base::RefCountedBytes());
SkAutoLockPixels lock(bitmap);
ASSERT_TRUE(gfx::JPEGCodec::Encode(
diff --git a/content/public/test/render_widget_test.h b/content/public/test/render_widget_test.h
index 7b471923..d163ea1 100644
--- a/content/public/test/render_widget_test.h
+++ b/content/public/test/render_widget_test.h
@@ -52,7 +52,8 @@ class RenderWidgetTest : public RenderViewTest {
// file_util::CreateTemporaryFile(&tmp_path);
// OutputBitmapToFile(bitmap, tmp_path);
// LOG(INFO) << "Bitmap image stored at: " << tmp_path.value();
- void OutputBitmapToFile(const SkBitmap& bitmap, const FilePath& file_path);
+ void OutputBitmapToFile(const SkBitmap& bitmap,
+ const base::FilePath& file_path);
};
} // namespace content
diff --git a/content/public/test/test_browser_context.cc b/content/public/test/test_browser_context.cc
index b954c70..7dc1c84 100644
--- a/content/public/test/test_browser_context.cc
+++ b/content/public/test/test_browser_context.cc
@@ -48,7 +48,7 @@ TestBrowserContext::TestBrowserContext() {
TestBrowserContext::~TestBrowserContext() {
}
-FilePath TestBrowserContext::TakePath() {
+base::FilePath TestBrowserContext::TakePath() {
return browser_context_dir_.Take();
}
@@ -57,7 +57,7 @@ void TestBrowserContext::SetSpecialStoragePolicy(
special_storage_policy_ = policy;
}
-FilePath TestBrowserContext::GetPath() {
+base::FilePath TestBrowserContext::GetPath() {
return browser_context_dir_.path();
}
@@ -94,7 +94,7 @@ TestBrowserContext::GetMediaRequestContextForRenderProcess(
net::URLRequestContextGetter*
TestBrowserContext::GetMediaRequestContextForStoragePartition(
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory) {
return NULL;
}
diff --git a/content/public/test/test_browser_context.h b/content/public/test/test_browser_context.h
index 41ddfdd..120fd01 100644
--- a/content/public/test/test_browser_context.h
+++ b/content/public/test/test_browser_context.h
@@ -23,11 +23,11 @@ class TestBrowserContext : public BrowserContext {
// Takes ownership of the temporary directory so that it's not deleted when
// this object is destructed.
- FilePath TakePath();
+ base::FilePath TakePath();
void SetSpecialStoragePolicy(quota::SpecialStoragePolicy* policy);
- virtual FilePath GetPath() OVERRIDE;
+ virtual base::FilePath GetPath() OVERRIDE;
virtual bool IsOffTheRecord() const OVERRIDE;
virtual DownloadManagerDelegate* GetDownloadManagerDelegate() OVERRIDE;
virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE;
@@ -38,7 +38,7 @@ class TestBrowserContext : public BrowserContext {
int renderer_child_id) OVERRIDE;
virtual net::URLRequestContextGetter*
GetMediaRequestContextForStoragePartition(
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory) OVERRIDE;
virtual ResourceContext* GetResourceContext() OVERRIDE;
virtual GeolocationPermissionContext*
diff --git a/content/public/test/test_file_error_injector.cc b/content/public/test/test_file_error_injector.cc
index 2a0c690..584b41056 100644
--- a/content/public/test/test_file_error_injector.cc
+++ b/content/public/test/test_file_error_injector.cc
@@ -30,7 +30,7 @@ class DownloadFileWithErrors: public DownloadFileImpl {
DownloadFileWithErrors(
scoped_ptr<DownloadSaveInfo> save_info,
- const FilePath& default_download_directory,
+ const base::FilePath& default_download_directory,
const GURL& url,
const GURL& referrer_url,
bool calculate_hash,
@@ -50,10 +50,10 @@ class DownloadFileWithErrors: public DownloadFileImpl {
virtual DownloadInterruptReason AppendDataToFile(
const char* data, size_t data_len) OVERRIDE;
virtual void RenameAndUniquify(
- const FilePath& full_path,
+ const base::FilePath& full_path,
const RenameCompletionCallback& callback) OVERRIDE;
virtual void RenameAndAnnotate(
- const FilePath& full_path,
+ const base::FilePath& full_path,
const RenameCompletionCallback& callback) OVERRIDE;
private:
@@ -96,16 +96,16 @@ static void RenameErrorCallback(
const DownloadFile::RenameCompletionCallback original_callback,
DownloadInterruptReason overwrite_error,
DownloadInterruptReason original_error,
- const FilePath& path_result) {
+ const base::FilePath& path_result) {
original_callback.Run(
overwrite_error,
overwrite_error == DOWNLOAD_INTERRUPT_REASON_NONE ?
- path_result : FilePath());
+ path_result : base::FilePath());
}
DownloadFileWithErrors::DownloadFileWithErrors(
scoped_ptr<DownloadSaveInfo> save_info,
- const FilePath& default_download_directory,
+ const base::FilePath& default_download_directory,
const GURL& url,
const GURL& referrer_url,
bool calculate_hash,
@@ -154,7 +154,7 @@ DownloadInterruptReason DownloadFileWithErrors::AppendDataToFile(
}
void DownloadFileWithErrors::RenameAndUniquify(
- const FilePath& full_path,
+ const base::FilePath& full_path,
const RenameCompletionCallback& callback) {
DownloadInterruptReason error_to_return = DOWNLOAD_INTERRUPT_REASON_NONE;
RenameCompletionCallback callback_to_use = callback;
@@ -171,7 +171,7 @@ void DownloadFileWithErrors::RenameAndUniquify(
}
void DownloadFileWithErrors::RenameAndAnnotate(
- const FilePath& full_path,
+ const base::FilePath& full_path,
const RenameCompletionCallback& callback) {
DownloadInterruptReason error_to_return = DOWNLOAD_INTERRUPT_REASON_NONE;
RenameCompletionCallback callback_to_use = callback;
@@ -223,7 +223,7 @@ class DownloadFileWithErrorsFactory : public DownloadFileFactory {
// DownloadFileFactory interface.
virtual DownloadFile* CreateFile(
scoped_ptr<DownloadSaveInfo> save_info,
- const FilePath& default_download_directory,
+ const base::FilePath& default_download_directory,
const GURL& url,
const GURL& referrer_url,
bool calculate_hash,
@@ -257,7 +257,7 @@ DownloadFileWithErrorsFactory::~DownloadFileWithErrorsFactory() {
DownloadFile* DownloadFileWithErrorsFactory::CreateFile(
scoped_ptr<DownloadSaveInfo> save_info,
- const FilePath& default_download_directory,
+ const base::FilePath& default_download_directory,
const GURL& url,
const GURL& referrer_url,
bool calculate_hash,
diff --git a/content/public/test/test_launcher.cc b/content/public/test/test_launcher.cc
index 178366d9..90e3b38 100644
--- a/content/public/test/test_launcher.cc
+++ b/content/public/test/test_launcher.cc
@@ -68,7 +68,7 @@ const char kTestTotalShards[] = "GTEST_TOTAL_SHARDS";
const char kTestShardIndex[] = "GTEST_SHARD_INDEX";
// The default output file for XML output.
-const FilePath::CharType kDefaultOutputFile[] = FILE_PATH_LITERAL(
+const base::FilePath::CharType kDefaultOutputFile[] = FILE_PATH_LITERAL(
"test_detail.xml");
// Quit test execution after this number of tests has timed out.
@@ -166,23 +166,24 @@ ResultsPrinter::ResultsPrinter(const CommandLine& command_line) : out_(NULL) {
return;
std::string flag = command_line.GetSwitchValueASCII(kGTestOutputFlag);
size_t colon_pos = flag.find(':');
- FilePath path;
+ base::FilePath path;
if (colon_pos != std::string::npos) {
- FilePath flag_path = command_line.GetSwitchValuePath(kGTestOutputFlag);
- FilePath::StringType path_string = flag_path.value();
- path = FilePath(path_string.substr(colon_pos + 1));
+ base::FilePath flag_path =
+ command_line.GetSwitchValuePath(kGTestOutputFlag);
+ base::FilePath::StringType path_string = flag_path.value();
+ path = base::FilePath(path_string.substr(colon_pos + 1));
// If the given path ends with '/', consider it is a directory.
// Note: This does NOT check that a directory (or file) actually exists
// (the behavior is same as what gtest does).
if (file_util::EndsWithSeparator(path)) {
- FilePath executable = command_line.GetProgram().BaseName();
+ base::FilePath executable = command_line.GetProgram().BaseName();
path = path.Append(executable.ReplaceExtension(
- FilePath::StringType(FILE_PATH_LITERAL("xml"))));
+ base::FilePath::StringType(FILE_PATH_LITERAL("xml"))));
}
}
if (path.value().empty())
- path = FilePath(kDefaultOutputFile);
- FilePath dir_name = path.DirName();
+ path = base::FilePath(kDefaultOutputFile);
+ base::FilePath dir_name = path.DirName();
if (!file_util::DirectoryExists(dir_name)) {
LOG(WARNING) << "The output directory does not exist. "
<< "Creating the directory: " << dir_name.value();
diff --git a/content/renderer/gpu/gpu_benchmarking_extension.cc b/content/renderer/gpu/gpu_benchmarking_extension.cc
index f350151..7fa3823 100644
--- a/content/renderer/gpu/gpu_benchmarking_extension.cc
+++ b/content/renderer/gpu/gpu_benchmarking_extension.cc
@@ -49,7 +49,7 @@ void InitSkGraphics() {
class SkPictureRecorder : public WebViewBenchmarkSupport::PaintClient {
public:
- explicit SkPictureRecorder(const FilePath& dirpath)
+ explicit SkPictureRecorder(const base::FilePath& dirpath)
: dirpath_(dirpath),
layer_id_(0) {
// Let skia register known effect subclasses. This basically enables
@@ -77,7 +77,7 @@ class SkPictureRecorder : public WebViewBenchmarkSupport::PaintClient {
}
private:
- FilePath dirpath_;
+ base::FilePath dirpath_;
int layer_id_;
SkPicture picture_;
};
@@ -220,8 +220,8 @@ class GpuBenchmarkingWrapper : public v8::Extension {
if (!benchmark_support)
return v8::Undefined();
- FilePath dirpath(FilePath::StringType(*dirname,
- *dirname + dirname.length()));
+ base::FilePath dirpath(
+ base::FilePath::StringType(*dirname, *dirname + dirname.length()));
if (!file_util::CreateDirectory(dirpath) ||
!file_util::PathIsWritable(dirpath)) {
std::string msg("Path is not writable: ");
diff --git a/content/renderer/hyphenator/hyphenator_unittest.cc b/content/renderer/hyphenator/hyphenator_unittest.cc
index b849929..2d41503 100644
--- a/content/renderer/hyphenator/hyphenator_unittest.cc
+++ b/content/renderer/hyphenator/hyphenator_unittest.cc
@@ -44,7 +44,7 @@ class MockListener : public IPC::Listener {
// Open the default dictionary and call the OnControllMessageReceived
// function with a HyphenatorMsg_SetDictionary message.
- FilePath dictionary_path;
+ base::FilePath dictionary_path;
if (!PathService::Get(base::DIR_SOURCE_ROOT, &dictionary_path))
return false;
dictionary_path = dictionary_path.AppendASCII("third_party");
@@ -84,7 +84,7 @@ class HyphenatorTest : public testing::Test {
}
bool Initialize() {
- FilePath dictionary_path;
+ base::FilePath dictionary_path;
if (!PathService::Get(base::DIR_SOURCE_ROOT, &dictionary_path))
return false;
dictionary_path = dictionary_path.AppendASCII("third_party");
diff --git a/content/renderer/pepper/pepper_file_chooser_host.cc b/content/renderer/pepper/pepper_file_chooser_host.cc
index 322603a..98edda5 100644
--- a/content/renderer/pepper/pepper_file_chooser_host.cc
+++ b/content/renderer/pepper/pepper_file_chooser_host.cc
@@ -101,9 +101,9 @@ void PepperFileChooserHost::StoreChosenFiles(
std::vector<ppapi::PPB_FileRef_CreateInfo> chosen_files;
for (size_t i = 0; i < files.size(); i++) {
#if defined(OS_WIN)
- FilePath file_path(UTF8ToWide(files[i].path));
+ base::FilePath file_path(UTF8ToWide(files[i].path));
#else
- FilePath file_path(files[i].path);
+ base::FilePath file_path(files[i].path);
#endif
webkit::ppapi::PPB_FileRef_Impl* ref =
diff --git a/content/renderer/pepper/pepper_file_chooser_host_unittest.cc b/content/renderer/pepper/pepper_file_chooser_host_unittest.cc
index 556f130..f49ab533 100644
--- a/content/renderer/pepper/pepper_file_chooser_host_unittest.cc
+++ b/content/renderer/pepper/pepper_file_chooser_host_unittest.cc
@@ -61,7 +61,7 @@ class PepperFileChooserHostTest : public RenderViewTest {
};
// For testing to convert our hardcoded file paths to 8-bit.
-std::string FilePathToUTF8(const FilePath::StringType& path) {
+std::string FilePathToUTF8(const base::FilePath::StringType& path) {
#if defined(OS_WIN)
return UTF16ToUTF8(path);
#else
@@ -107,7 +107,7 @@ TEST_F(PepperFileChooserHostTest, Show) {
// path separator so we include both a Unix and a Windows one.
ui::SelectedFileInfo selected_info;
selected_info.display_name = FILE_PATH_LITERAL("Hello, world");
- selected_info.local_path = FilePath(FILE_PATH_LITERAL("myp\\ath/foo"));
+ selected_info.local_path = base::FilePath(FILE_PATH_LITERAL("myp\\ath/foo"));
std::vector<ui::SelectedFileInfo> selected_info_vector;
selected_info_vector.push_back(selected_info);
RenderViewImpl* view_impl = static_cast<RenderViewImpl*>(view_);
diff --git a/content/renderer/pepper/pepper_file_io_host.cc b/content/renderer/pepper/pepper_file_io_host.cc
index e6e2b52..d0fb617 100644
--- a/content/renderer/pepper/pepper_file_io_host.cc
+++ b/content/renderer/pepper/pepper_file_io_host.cc
@@ -57,7 +57,7 @@ class PlatformGeneralCallbackTranslator
}
virtual void DidReadMetadata(const base::PlatformFileInfo& file_info,
- const FilePath& platform_path) OVERRIDE {
+ const base::FilePath& platform_path) OVERRIDE {
NOTREACHED();
}
diff --git a/content/renderer/pepper/pepper_hung_plugin_filter.cc b/content/renderer/pepper/pepper_hung_plugin_filter.cc
index 7d0574d..26632af 100644
--- a/content/renderer/pepper/pepper_hung_plugin_filter.cc
+++ b/content/renderer/pepper/pepper_hung_plugin_filter.cc
@@ -23,9 +23,10 @@ const int kBlockedHardThresholdSec = kHungThresholdSec * 1.5;
} // namespace
-PepperHungPluginFilter::PepperHungPluginFilter(const FilePath& plugin_path,
- int view_routing_id,
- int plugin_child_id)
+PepperHungPluginFilter::PepperHungPluginFilter(
+ const base::FilePath& plugin_path,
+ int view_routing_id,
+ int plugin_child_id)
: plugin_path_(plugin_path),
view_routing_id_(view_routing_id),
plugin_child_id_(plugin_child_id),
diff --git a/content/renderer/pepper/pepper_hung_plugin_filter.h b/content/renderer/pepper/pepper_hung_plugin_filter.h
index 35fc45e..20b8ae5 100644
--- a/content/renderer/pepper/pepper_hung_plugin_filter.h
+++ b/content/renderer/pepper/pepper_hung_plugin_filter.h
@@ -34,7 +34,7 @@ class PepperHungPluginFilter
// send messages to the browser via that view's route. The |plugin_child_id|
// is the ID in the browser process of the pepper plugin process host. We use
// this to identify the proper plugin process to terminate.
- PepperHungPluginFilter(const FilePath& plugin_path,
+ PepperHungPluginFilter(const base::FilePath& plugin_path,
int view_routing_id,
int plugin_child_id);
@@ -74,7 +74,7 @@ class PepperHungPluginFilter
base::Lock lock_;
- FilePath plugin_path_;
+ base::FilePath plugin_path_;
int view_routing_id_;
int plugin_child_id_;
diff --git a/content/renderer/pepper/pepper_plugin_delegate_impl.cc b/content/renderer/pepper/pepper_plugin_delegate_impl.cc
index f383290..895681f 100644
--- a/content/renderer/pepper/pepper_plugin_delegate_impl.cc
+++ b/content/renderer/pepper/pepper_plugin_delegate_impl.cc
@@ -271,7 +271,7 @@ class AsyncOpenFileSystemURLCallbackTranslator
}
virtual void DidReadMetadata(
const base::PlatformFileInfo& file_info,
- const FilePath& platform_path) OVERRIDE {
+ const base::FilePath& platform_path) OVERRIDE {
NOTREACHED();
}
virtual void DidCreateSnapshotFile(
@@ -377,7 +377,7 @@ PepperPluginDelegateImpl::CreatePepperPluginModule(
*pepper_plugin_was_registered = true;
// See if a module has already been loaded for this plugin.
- FilePath path(webplugin_info.path);
+ base::FilePath path(webplugin_info.path);
scoped_refptr<webkit::ppapi::PluginModule> module =
PepperPluginRegistry::GetInstance()->GetLiveModule(path);
if (module) {
@@ -439,7 +439,7 @@ PepperPluginDelegateImpl::CreatePepperPluginModule(
RendererPpapiHost* PepperPluginDelegateImpl::CreateExternalPluginModule(
scoped_refptr<webkit::ppapi::PluginModule> module,
- const FilePath& path,
+ const base::FilePath& path,
ppapi::PpapiPermissions permissions,
const IPC::ChannelHandle& channel_handle,
base::ProcessId peer_pid,
@@ -461,7 +461,7 @@ scoped_refptr<PepperBrokerImpl> PepperPluginDelegateImpl::CreateBroker(
DCHECK(!plugin_module->GetBroker());
// The broker path is the same as the plugin.
- const FilePath& broker_path = plugin_module->path();
+ const base::FilePath& broker_path = plugin_module->path();
scoped_refptr<PepperBrokerImpl> broker =
new PepperBrokerImpl(plugin_module, this);
@@ -484,7 +484,7 @@ scoped_refptr<PepperBrokerImpl> PepperPluginDelegateImpl::CreateBroker(
RendererPpapiHost* PepperPluginDelegateImpl::CreateOutOfProcessModule(
webkit::ppapi::PluginModule* module,
- const FilePath& path,
+ const base::FilePath& path,
ppapi::PpapiPermissions permissions,
const IPC::ChannelHandle& channel_handle,
base::ProcessId peer_pid,
@@ -803,7 +803,7 @@ SkBitmap* PepperPluginDelegateImpl::GetSadPluginBitmap() {
}
WebKit::WebPlugin* PepperPluginDelegateImpl::CreatePluginReplacement(
- const FilePath& file_path) {
+ const base::FilePath& file_path) {
return GetContentClient()->renderer()->CreatePluginReplacement(
render_view_, file_path);
}
@@ -958,7 +958,7 @@ void PepperPluginDelegateImpl::OnPpapiBrokerPermissionResult(
}
bool PepperPluginDelegateImpl::AsyncOpenFile(
- const FilePath& path,
+ const base::FilePath& path,
int flags,
const AsyncOpenFileCallback& callback) {
int message_id = pending_async_open_files_.Add(
@@ -1117,7 +1117,7 @@ bool PepperPluginDelegateImpl::AsyncOpenFileSystemURL(
}
void PepperPluginDelegateImpl::SyncGetFileSystemPlatformPath(
- const GURL& url, FilePath* platform_path) {
+ const GURL& url, base::FilePath* platform_path) {
RenderThreadImpl::current()->Send(new FileSystemHostMsg_SyncGetPlatformPath(
url, platform_path));
}
diff --git a/content/renderer/pepper/renderer_ppapi_host_impl.cc b/content/renderer/pepper/renderer_ppapi_host_impl.cc
index fdc2459..2e9bdb8b 100644
--- a/content/renderer/pepper/renderer_ppapi_host_impl.cc
+++ b/content/renderer/pepper/renderer_ppapi_host_impl.cc
@@ -33,7 +33,7 @@ CONTENT_EXPORT RendererPpapiHost*
RendererPpapiHost::CreateExternalPluginModule(
scoped_refptr<PluginModule> plugin_module,
PluginInstance* plugin_instance,
- const FilePath& file_path,
+ const base::FilePath& file_path,
ppapi::PpapiPermissions permissions,
const IPC::ChannelHandle& channel_handle,
base::ProcessId plugin_pid,
diff --git a/content/renderer/render_thread_impl.cc b/content/renderer/render_thread_impl.cc
index 7ee9da4..145313b 100644
--- a/content/renderer/render_thread_impl.cc
+++ b/content/renderer/render_thread_impl.cc
@@ -365,7 +365,7 @@ void RenderThreadImpl::Init() {
// Note that under Linux, the media library will normally already have
// been initialized by the Zygote before this instance became a Renderer.
- FilePath media_path;
+ base::FilePath media_path;
PathService::Get(DIR_MEDIA_LIBS, &media_path);
if (!media_path.empty())
media::InitializeMediaLibrary(media_path);
diff --git a/content/renderer/render_view_impl.cc b/content/renderer/render_view_impl.cc
index f060f156..8d12163 100644
--- a/content/renderer/render_view_impl.cc
+++ b/content/renderer/render_view_impl.cc
@@ -915,7 +915,7 @@ WebKit::WebView* RenderViewImpl::webview() const {
return static_cast<WebKit::WebView*>(webwidget());
}
-void RenderViewImpl::PluginCrashed(const FilePath& plugin_path,
+void RenderViewImpl::PluginCrashed(const base::FilePath& plugin_path,
base::ProcessId plugin_pid) {
Send(new ViewHostMsg_CrashedPlugin(routing_id_, plugin_path, plugin_pid));
}
@@ -4632,7 +4632,7 @@ void RenderViewImpl::LoadURLExternally(
// webkit_glue::WebPluginPageDelegate ------------------------------------------
webkit::npapi::WebPluginDelegate* RenderViewImpl::CreatePluginDelegate(
- const FilePath& file_path,
+ const base::FilePath& file_path,
const std::string& mime_type) {
if (!PluginChannelHost::IsListening()) {
LOG(ERROR) << "PluginChannelHost isn't listening";
@@ -4654,7 +4654,7 @@ webkit::npapi::WebPluginDelegate* RenderViewImpl::CreatePluginDelegate(
}
WebKit::WebPlugin* RenderViewImpl::CreatePluginReplacement(
- const FilePath& file_path) {
+ const base::FilePath& file_path) {
return GetContentClient()->renderer()->CreatePluginReplacement(
this, file_path);
}
@@ -5346,7 +5346,7 @@ void RenderViewImpl::OnCustomContextMenuAction(
void RenderViewImpl::OnEnumerateDirectoryResponse(
int id,
- const std::vector<FilePath>& paths) {
+ const std::vector<base::FilePath>& paths) {
if (!enumeration_completions_[id])
return;
@@ -5529,8 +5529,8 @@ void RenderViewImpl::OnGetAllSavableResourceLinksForCurrentPage(
void RenderViewImpl::OnGetSerializedHtmlDataForCurrentPageWithLocalLinks(
const std::vector<GURL>& links,
- const std::vector<FilePath>& local_paths,
- const FilePath& local_directory_name) {
+ const std::vector<base::FilePath>& local_paths,
+ const base::FilePath& local_directory_name) {
// Convert std::vector of GURLs to WebVector<WebURL>
WebVector<WebURL> weburl_links(links);
diff --git a/content/renderer/render_view_impl.h b/content/renderer/render_view_impl.h
index 23b5d93..468b39f 100644
--- a/content/renderer/render_view_impl.h
+++ b/content/renderer/render_view_impl.h
@@ -298,7 +298,8 @@ class CONTENT_EXPORT RenderViewImpl
// (See also WebPluginPageDelegate implementation.)
// Notification that the given plugin has crashed.
- void PluginCrashed(const FilePath& plugin_path, base::ProcessId plugin_pid);
+ void PluginCrashed(const base::FilePath& plugin_path,
+ base::ProcessId plugin_pid);
// Creates a fullscreen container for a pepper plugin instance.
RenderWidgetFullscreenPepper* CreatePepperFullscreenContainer(
@@ -735,10 +736,10 @@ class CONTENT_EXPORT RenderViewImpl
// webkit_glue::WebPluginPageDelegate implementation -------------------------
virtual webkit::npapi::WebPluginDelegate* CreatePluginDelegate(
- const FilePath& file_path,
+ const base::FilePath& file_path,
const std::string& mime_type) OVERRIDE;
virtual WebKit::WebPlugin* CreatePluginReplacement(
- const FilePath& file_path) OVERRIDE;
+ const base::FilePath& file_path) OVERRIDE;
virtual void CreatedPluginWindow(gfx::PluginWindowHandle handle) OVERRIDE;
virtual void WillDestroyPluginWindow(gfx::PluginWindowHandle handle) OVERRIDE;
virtual void DidMovePlugin(
@@ -951,7 +952,8 @@ class CONTENT_EXPORT RenderViewImpl
void OnEnablePreferredSizeChangedMode();
void OnEnableAutoResize(const gfx::Size& min_size, const gfx::Size& max_size);
void OnDisableAutoResize(const gfx::Size& new_size);
- void OnEnumerateDirectoryResponse(int id, const std::vector<FilePath>& paths);
+ void OnEnumerateDirectoryResponse(int id,
+ const std::vector<base::FilePath>& paths);
void OnExecuteEditCommand(const std::string& name, const std::string& value);
void OnExtendSelectionAndDelete(int before, int after);
void OnFileChooserResponse(
@@ -960,8 +962,8 @@ class CONTENT_EXPORT RenderViewImpl
void OnGetAllSavableResourceLinksForCurrentPage(const GURL& page_url);
void OnGetSerializedHtmlDataForCurrentPageWithLocalLinks(
const std::vector<GURL>& links,
- const std::vector<FilePath>& local_paths,
- const FilePath& local_directory_name);
+ const std::vector<base::FilePath>& local_paths,
+ const base::FilePath& local_directory_name);
void OnMediaPlayerActionAt(const gfx::Point& location,
const WebKit::WebMediaPlayerAction& action);
diff --git a/content/renderer/renderer_main_platform_delegate_linux.cc b/content/renderer/renderer_main_platform_delegate_linux.cc
index c0b0172..a653bfe 100644
--- a/content/renderer/renderer_main_platform_delegate_linux.cc
+++ b/content/renderer/renderer_main_platform_delegate_linux.cc
@@ -68,7 +68,7 @@ void RendererMainPlatformDelegate::RunSandboxTests(bool no_sandbox) {
// Under the setuid sandbox, we should not be able to open any file via the
// filesystem.
if (linux_sandbox->GetStatus() & kSandboxLinuxSUID) {
- CHECK(!file_util::PathExists(FilePath("/proc/cpuinfo")));
+ CHECK(!file_util::PathExists(base::FilePath("/proc/cpuinfo")));
}
#if defined(__x86_64__)
diff --git a/content/renderer/renderer_webkitplatformsupport_impl.cc b/content/renderer/renderer_webkitplatformsupport_impl.cc
index 99c336a..5c3263a 100644
--- a/content/renderer/renderer_webkitplatformsupport_impl.cc
+++ b/content/renderer/renderer_webkitplatformsupport_impl.cc
@@ -373,7 +373,7 @@ WebString RendererWebKitPlatformSupportImpl::MimeRegistry::mimeTypeFromFile(
// these calls over to the browser process.
std::string mime_type;
RenderThread::Get()->Send(new MimeRegistryMsg_GetMimeTypeFromFile(
- FilePath(webkit_base::WebStringToFilePathString(file_path)),
+ base::FilePath(webkit_base::WebStringToFilePathString(file_path)),
&mime_type));
return ASCIIToUTF16(mime_type);
}
@@ -386,7 +386,7 @@ RendererWebKitPlatformSupportImpl::MimeRegistry::preferredExtensionForMIMEType(
// The sandbox restricts our access to the registry, so we need to proxy
// these calls over to the browser process.
- FilePath::StringType file_extension;
+ base::FilePath::StringType file_extension;
RenderThread::Get()->Send(
new MimeRegistryMsg_GetPreferredExtensionForMimeType(
UTF16ToASCII(mime_type), &file_extension));
diff --git a/content/shell/android/browsertests_apk/content_browser_tests_android.cc b/content/shell/android/browsertests_apk/content_browser_tests_android.cc
index 165f804..9a2fd46 100644
--- a/content/shell/android/browsertests_apk/content_browser_tests_android.cc
+++ b/content/shell/android/browsertests_apk/content_browser_tests_android.cc
@@ -73,8 +73,9 @@ static void RunTests(JNIEnv* env,
CommandLine(argc, &argv[0]), false);
// Create fifo and redirect stdout and stderr to it.
- FilePath files_dir(base::android::ConvertJavaStringToUTF8(env, jfiles_dir));
- FilePath fifo_path(files_dir.Append(FilePath("test.fifo")));
+ base::FilePath files_dir(
+ base::android::ConvertJavaStringToUTF8(env, jfiles_dir));
+ base::FilePath fifo_path(files_dir.Append(base::FilePath("test.fifo")));
CreateFIFO(fifo_path.value().c_str());
RedirectStream(stdout, fifo_path.value().c_str(), "w");
dup2(STDOUT_FILENO, STDERR_FILENO);
diff --git a/content/shell/paths_mac.mm b/content/shell/paths_mac.mm
index 120ca34..a2a2993 100644
--- a/content/shell/paths_mac.mm
+++ b/content/shell/paths_mac.mm
@@ -56,5 +56,5 @@ base::FilePath GetResourcesPakFilePath() {
[base::mac::FrameworkBundle() pathForResource:@"content_shell"
ofType:@"pak"];
- return FilePath([pak_path fileSystemRepresentation]);
+ return base::FilePath([pak_path fileSystemRepresentation]);
}
diff --git a/content/shell/shell_browser_context.h b/content/shell/shell_browser_context.h
index 938c3b8..44e0a16 100644
--- a/content/shell/shell_browser_context.h
+++ b/content/shell/shell_browser_context.h
@@ -57,7 +57,7 @@ class ShellBrowserContext : public BrowserContext {
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
chrome_devtools_protocol_handler);
net::URLRequestContextGetter* CreateRequestContextForStoragePartition(
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory,
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
blob_protocol_handler,
diff --git a/content/shell/shell_content_browser_client.cc b/content/shell/shell_content_browser_client.cc
index 0680d39..afb1179 100644
--- a/content/shell/shell_content_browser_client.cc
+++ b/content/shell/shell_content_browser_client.cc
@@ -104,7 +104,7 @@ net::URLRequestContextGetter* ShellContentBrowserClient::CreateRequestContext(
net::URLRequestContextGetter*
ShellContentBrowserClient::CreateRequestContextForStoragePartition(
BrowserContext* content_browser_context,
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory,
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
blob_protocol_handler,
diff --git a/content/shell/shell_content_browser_client.h b/content/shell/shell_content_browser_client.h
index 78ef9ff..40902ff 100644
--- a/content/shell/shell_content_browser_client.h
+++ b/content/shell/shell_content_browser_client.h
@@ -41,7 +41,7 @@ class ShellContentBrowserClient : public ContentBrowserClient {
chrome_devtools_protocol_handler) OVERRIDE;
virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition(
BrowserContext* browser_context,
- const FilePath& partition_path,
+ const base::FilePath& partition_path,
bool in_memory,
scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>
blob_protocol_handler,