summaryrefslogtreecommitdiffstats
path: root/webkit/fileapi/isolated_context_unittest.cc
diff options
context:
space:
mode:
authortbarzic@chromium.org <tbarzic@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-01-18 03:12:54 +0000
committertbarzic@chromium.org <tbarzic@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-01-18 03:12:54 +0000
commit9d5d6986dfaed15ef3719250fbf7fb8347bebd80 (patch)
treea472d1593efc197e15d9474d26e93530b939ec7f /webkit/fileapi/isolated_context_unittest.cc
parentd22af016d12e789ac7c5976c300c819ebe4340b3 (diff)
downloadchromium_src-9d5d6986dfaed15ef3719250fbf7fb8347bebd80.zip
chromium_src-9d5d6986dfaed15ef3719250fbf7fb8347bebd80.tar.gz
chromium_src-9d5d6986dfaed15ef3719250fbf7fb8347bebd80.tar.bz2
Extract external file systems handling from isolated context.
Move mount point info bookeeping from CrosMountPointProvider to ExternalMountPoints. Add some tests for CrosMountPointProvider. BUG=158837 TEST=content_unittests:CrosMountPointProvider* TBR=benwells@chromium.org Review URL: https://chromiumcodereview.appspot.com/11648027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@177578 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'webkit/fileapi/isolated_context_unittest.cc')
-rw-r--r--webkit/fileapi/isolated_context_unittest.cc12
1 files changed, 6 insertions, 6 deletions
diff --git a/webkit/fileapi/isolated_context_unittest.cc b/webkit/fileapi/isolated_context_unittest.cc
index 78efd16..bf36df9 100644
--- a/webkit/fileapi/isolated_context_unittest.cc
+++ b/webkit/fileapi/isolated_context_unittest.cc
@@ -19,7 +19,7 @@
namespace fileapi {
-typedef IsolatedContext::FileInfo FileInfo;
+typedef IsolatedContext::MountPointInfo FileInfo;
namespace {
@@ -95,7 +95,7 @@ TEST_F(IsolatedContextTest, RegisterAndRevokeTest) {
std::string cracked_id;
FilePath cracked_path;
FileSystemType cracked_type;
- ASSERT_TRUE(isolated_context()->CrackIsolatedPath(
+ ASSERT_TRUE(isolated_context()->CrackVirtualPath(
virtual_path, &cracked_id, &cracked_type, &cracked_path));
ASSERT_EQ(kTestPaths[i].NormalizePathSeparators().value(),
cracked_path.value());
@@ -191,11 +191,11 @@ TEST_F(IsolatedContextTest, CrackWithRelativePaths) {
FilePath cracked_path;
FileSystemType cracked_type;
if (!relatives[j].valid) {
- ASSERT_FALSE(isolated_context()->CrackIsolatedPath(
+ ASSERT_FALSE(isolated_context()->CrackVirtualPath(
virtual_path, &cracked_id, &cracked_type, &cracked_path));
continue;
}
- ASSERT_TRUE(isolated_context()->CrackIsolatedPath(
+ ASSERT_TRUE(isolated_context()->CrackVirtualPath(
virtual_path, &cracked_id, &cracked_type, &cracked_path));
ASSERT_EQ(kTestPaths[i].Append(relatives[j].path)
.NormalizePathSeparators().value(),
@@ -214,7 +214,7 @@ TEST_F(IsolatedContextTest, TestWithVirtualRoot) {
// as "/" of the isolated filesystem is a pure virtual directory
// that has no corresponding platform directory.
FilePath virtual_path = isolated_context()->CreateVirtualRootPath(id_);
- ASSERT_TRUE(isolated_context()->CrackIsolatedPath(
+ ASSERT_TRUE(isolated_context()->CrackVirtualPath(
virtual_path, &cracked_id, NULL, &cracked_path));
ASSERT_EQ(FPL(""), cracked_path.value());
ASSERT_EQ(id_, cracked_id);
@@ -223,7 +223,7 @@ TEST_F(IsolatedContextTest, TestWithVirtualRoot) {
// included in the kTestPaths).
virtual_path = isolated_context()->CreateVirtualRootPath(
id_).AppendASCII("foo");
- ASSERT_FALSE(isolated_context()->CrackIsolatedPath(
+ ASSERT_FALSE(isolated_context()->CrackVirtualPath(
virtual_path, &cracked_id, NULL, &cracked_path));
}