1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "webkit/browser/fileapi/external_mount_points.h" 6 7 #include <string> 8 9 #include "base/files/file_path.h" 10 #include "testing/gtest/include/gtest/gtest.h" 11 #include "webkit/browser/fileapi/file_system_url.h" 12 13 #define FPL FILE_PATH_LITERAL 14 15 #if defined(FILE_PATH_USES_DRIVE_LETTERS) 16 #define DRIVE FPL("C:") 17 #else 18 #define DRIVE 19 #endif 20 21 using fileapi::FileSystemURL; 22 23 namespace { 24 25 TEST(ExternalMountPointsTest, AddMountPoint) { 26 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 27 fileapi::ExternalMountPoints::CreateRefCounted()); 28 29 struct TestCase { 30 // The mount point's name. 31 const char* const name; 32 // The mount point's path. 33 const base::FilePath::CharType* const path; 34 // Whether the mount point registration should succeed. 35 bool success; 36 // Path returned by GetRegisteredPath. NULL if the method is expected to 37 // fail. 38 const base::FilePath::CharType* const registered_path; 39 }; 40 41 const TestCase kTestCases[] = { 42 // Valid mount point. 43 { "test", DRIVE FPL("/foo/test"), true, DRIVE FPL("/foo/test") }, 44 // Valid mount point with only one path component. 45 { "bbb", DRIVE FPL("/bbb"), true, DRIVE FPL("/bbb") }, 46 // Existing mount point path is substring of the mount points path. 47 { "test11", DRIVE FPL("/foo/test11"), true, DRIVE FPL("/foo/test11") }, 48 // Path substring of an existing path. 49 { "test1", DRIVE FPL("/foo/test1"), true, DRIVE FPL("/foo/test1") }, 50 // Empty mount point name and path. 51 { "", DRIVE FPL(""), false, NULL }, 52 // Empty mount point name. 53 { "", DRIVE FPL("/ddd"), false, NULL }, 54 // Empty mount point path. 55 { "empty_path", FPL(""), true, FPL("") }, 56 // Name different from path's base name. 57 { "not_base_name", DRIVE FPL("/x/y/z"), true, DRIVE FPL("/x/y/z") }, 58 // References parent. 59 { "invalid", DRIVE FPL("../foo/invalid"), false, NULL }, 60 // Relative path. 61 { "relative", DRIVE FPL("foo/relative"), false, NULL }, 62 // Existing mount point path. 63 { "path_exists", DRIVE FPL("/foo/test"), false, NULL }, 64 // Mount point with the same name exists. 65 { "test", DRIVE FPL("/foo/a/test_name_exists"), false, 66 DRIVE FPL("/foo/test") }, 67 // Child of an existing mount point. 68 { "a1", DRIVE FPL("/foo/test/a"), false, NULL }, 69 // Parent of an existing mount point. 70 { "foo1", DRIVE FPL("/foo"), false, NULL }, 71 // Bit bigger depth. 72 { "g", DRIVE FPL("/foo/a/b/c/d/e/f/g"), true, 73 DRIVE FPL("/foo/a/b/c/d/e/f/g") }, 74 // Sibling mount point (with similar name) exists. 75 { "ff", DRIVE FPL("/foo/a/b/c/d/e/ff"), true, 76 DRIVE FPL("/foo/a/b/c/d/e/ff") }, 77 // Lexicographically last among existing mount points. 78 { "yyy", DRIVE FPL("/zzz/yyy"), true, DRIVE FPL("/zzz/yyy") }, 79 // Parent of the lexicographically last mount point. 80 { "zzz1", DRIVE FPL("/zzz"), false, NULL }, 81 // Child of the lexicographically last mount point. 82 { "xxx1", DRIVE FPL("/zzz/yyy/xxx"), false, NULL }, 83 // Lexicographically first among existing mount points. 84 { "b", DRIVE FPL("/a/b"), true, DRIVE FPL("/a/b") }, 85 // Parent of lexicographically first mount point. 86 { "a2", DRIVE FPL("/a"), false, NULL }, 87 // Child of lexicographically last mount point. 88 { "c1", DRIVE FPL("/a/b/c"), false, NULL }, 89 // Parent to all of the mount points. 90 { "root", DRIVE FPL("/"), false, NULL }, 91 // Path contains .. component. 92 { "funky", DRIVE FPL("/tt/fun/../funky"), false, NULL }, 93 // Windows separators. 94 #if defined(FILE_PATH_USES_WIN_SEPARATORS) 95 { "win", DRIVE FPL("\\try\\separators\\win"), true, 96 DRIVE FPL("\\try\\separators\\win") }, 97 { "win1", DRIVE FPL("\\try/separators\\win1"), true, 98 DRIVE FPL("\\try/separators\\win1") }, 99 { "win2", DRIVE FPL("\\try/separators\\win"), false, NULL }, 100 #else 101 { "win", DRIVE FPL("\\separators\\win"), false, NULL }, 102 { "win1", DRIVE FPL("\\try/separators\\win1"), false, NULL }, 103 #endif 104 // Win separators, but relative path. 105 { "win2", DRIVE FPL("try\\separators\\win2"), false, NULL }, 106 }; 107 108 // Test adding mount points. 109 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { 110 EXPECT_EQ(kTestCases[i].success, 111 mount_points->RegisterFileSystem( 112 kTestCases[i].name, 113 fileapi::kFileSystemTypeNativeLocal, 114 fileapi::FileSystemMountOption(), 115 base::FilePath(kTestCases[i].path))) 116 << "Adding mount point: " << kTestCases[i].name << " with path " 117 << kTestCases[i].path; 118 } 119 120 // Test that final mount point presence state is as expected. 121 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { 122 base::FilePath found_path; 123 EXPECT_EQ(kTestCases[i].registered_path != NULL, 124 mount_points->GetRegisteredPath(kTestCases[i].name, &found_path)) 125 << "Test case: " << i; 126 127 if (kTestCases[i].registered_path) { 128 base::FilePath expected_path(kTestCases[i].registered_path); 129 EXPECT_EQ(expected_path.NormalizePathSeparators(), found_path); 130 } 131 } 132 } 133 134 TEST(ExternalMountPointsTest, GetVirtualPath) { 135 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 136 fileapi::ExternalMountPoints::CreateRefCounted()); 137 138 mount_points->RegisterFileSystem("c", 139 fileapi::kFileSystemTypeNativeLocal, 140 fileapi::FileSystemMountOption(), 141 base::FilePath(DRIVE FPL("/a/b/c"))); 142 // Note that "/a/b/c" < "/a/b/c(1)" < "/a/b/c/". 143 mount_points->RegisterFileSystem("c(1)", 144 fileapi::kFileSystemTypeNativeLocal, 145 fileapi::FileSystemMountOption(), 146 base::FilePath(DRIVE FPL("/a/b/c(1)"))); 147 mount_points->RegisterFileSystem("x", 148 fileapi::kFileSystemTypeNativeLocal, 149 fileapi::FileSystemMountOption(), 150 base::FilePath(DRIVE FPL("/z/y/x"))); 151 mount_points->RegisterFileSystem("o", 152 fileapi::kFileSystemTypeNativeLocal, 153 fileapi::FileSystemMountOption(), 154 base::FilePath(DRIVE FPL("/m/n/o"))); 155 // A mount point whose name does not match its path base name. 156 mount_points->RegisterFileSystem("mount", 157 fileapi::kFileSystemTypeNativeLocal, 158 fileapi::FileSystemMountOption(), 159 base::FilePath(DRIVE FPL("/root/foo"))); 160 // A mount point with an empty path. 161 mount_points->RegisterFileSystem("empty_path", 162 fileapi::kFileSystemTypeNativeLocal, 163 fileapi::FileSystemMountOption(), 164 base::FilePath()); 165 166 struct TestCase { 167 const base::FilePath::CharType* const local_path; 168 bool success; 169 const base::FilePath::CharType* const virtual_path; 170 }; 171 172 const TestCase kTestCases[] = { 173 // Empty path. 174 { FPL(""), false, FPL("") }, 175 // No registered mount point (but is parent to a mount point). 176 { DRIVE FPL("/a/b"), false, FPL("") }, 177 // No registered mount point (but is parent to a mount point). 178 { DRIVE FPL("/z/y"), false, FPL("") }, 179 // No registered mount point (but is parent to a mount point). 180 { DRIVE FPL("/m/n"), false, FPL("") }, 181 // No registered mount point. 182 { DRIVE FPL("/foo/mount"), false, FPL("") }, 183 // An existing mount point path is substring. 184 { DRIVE FPL("/a/b/c1"), false, FPL("") }, 185 // No leading /. 186 { DRIVE FPL("a/b/c"), false, FPL("") }, 187 // Sibling to a root path. 188 { DRIVE FPL("/a/b/d/e"), false, FPL("") }, 189 // Sibling to a root path. 190 { DRIVE FPL("/z/y/v/u"), false, FPL("") }, 191 // Sibling to a root path. 192 { DRIVE FPL("/m/n/p/q"), false, FPL("") }, 193 // Mount point root path. 194 { DRIVE FPL("/a/b/c"), true, FPL("c") }, 195 // Mount point root path. 196 { DRIVE FPL("/z/y/x"), true, FPL("x") }, 197 // Mount point root path. 198 { DRIVE FPL("/m/n/o"), true, FPL("o") }, 199 // Mount point child path. 200 { DRIVE FPL("/a/b/c/d/e"), true, FPL("c/d/e") }, 201 // Mount point child path. 202 { DRIVE FPL("/z/y/x/v/u"), true, FPL("x/v/u") }, 203 // Mount point child path. 204 { DRIVE FPL("/m/n/o/p/q"), true, FPL("o/p/q") }, 205 // Name doesn't match mount point path base name. 206 { DRIVE FPL("/root/foo/a/b/c"), true, FPL("mount/a/b/c") }, 207 { DRIVE FPL("/root/foo"), true, FPL("mount") }, 208 // Mount point contains character whose ASCII code is smaller than file path 209 // separator's. 210 { DRIVE FPL("/a/b/c(1)/d/e"), true, FPL("c(1)/d/e") }, 211 #if defined(FILE_PATH_USES_WIN_SEPARATORS) 212 // Path with win separators mixed in. 213 { DRIVE FPL("/a\\b\\c/d"), true, FPL("c/d") }, 214 #endif 215 }; 216 217 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { 218 // Initialize virtual path with a value. 219 base::FilePath virtual_path(DRIVE FPL("/mount")); 220 base::FilePath local_path(kTestCases[i].local_path); 221 EXPECT_EQ(kTestCases[i].success, 222 mount_points->GetVirtualPath(local_path, &virtual_path)) 223 << "Resolving " << kTestCases[i].local_path; 224 225 // There are no guarantees for |virtual_path| value if |GetVirtualPath| 226 // fails. 227 if (!kTestCases[i].success) 228 continue; 229 230 base::FilePath expected_virtual_path(kTestCases[i].virtual_path); 231 EXPECT_EQ(expected_virtual_path.NormalizePathSeparators(), virtual_path) 232 << "Resolving " << kTestCases[i].local_path; 233 } 234 } 235 236 TEST(ExternalMountPointsTest, HandlesFileSystemMountType) { 237 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 238 fileapi::ExternalMountPoints::CreateRefCounted()); 239 240 const GURL test_origin("http://chromium.org"); 241 const base::FilePath test_path(FPL("/mount")); 242 243 // Should handle External File System. 244 EXPECT_TRUE(mount_points->HandlesFileSystemMountType( 245 fileapi::kFileSystemTypeExternal)); 246 247 // Shouldn't handle the rest. 248 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 249 fileapi::kFileSystemTypeIsolated)); 250 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 251 fileapi::kFileSystemTypeTemporary)); 252 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 253 fileapi::kFileSystemTypePersistent)); 254 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 255 fileapi::kFileSystemTypeTest)); 256 // Not even if it's external subtype. 257 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 258 fileapi::kFileSystemTypeNativeLocal)); 259 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 260 fileapi::kFileSystemTypeRestrictedNativeLocal)); 261 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 262 fileapi::kFileSystemTypeDrive)); 263 EXPECT_FALSE(mount_points->HandlesFileSystemMountType( 264 fileapi::kFileSystemTypeSyncable)); 265 } 266 267 TEST(ExternalMountPointsTest, CreateCrackedFileSystemURL) { 268 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 269 fileapi::ExternalMountPoints::CreateRefCounted()); 270 271 const GURL kTestOrigin("http://chromium.org"); 272 273 mount_points->RegisterFileSystem("c", 274 fileapi::kFileSystemTypeNativeLocal, 275 fileapi::FileSystemMountOption(), 276 base::FilePath(DRIVE FPL("/a/b/c"))); 277 mount_points->RegisterFileSystem("c(1)", 278 fileapi::kFileSystemTypeDrive, 279 fileapi::FileSystemMountOption(), 280 base::FilePath(DRIVE FPL("/a/b/c(1)"))); 281 mount_points->RegisterFileSystem("empty_path", 282 fileapi::kFileSystemTypeSyncable, 283 fileapi::FileSystemMountOption(), 284 base::FilePath()); 285 mount_points->RegisterFileSystem("mount", 286 fileapi::kFileSystemTypeDrive, 287 fileapi::FileSystemMountOption(), 288 base::FilePath(DRIVE FPL("/root"))); 289 290 // Try cracking invalid GURL. 291 FileSystemURL invalid = mount_points->CrackURL(GURL("http://chromium.og")); 292 EXPECT_FALSE(invalid.is_valid()); 293 294 // Try cracking isolated path. 295 FileSystemURL isolated = mount_points->CreateCrackedFileSystemURL( 296 kTestOrigin, fileapi::kFileSystemTypeIsolated, base::FilePath(FPL("c"))); 297 EXPECT_FALSE(isolated.is_valid()); 298 299 // Try native local which is not cracked. 300 FileSystemURL native_local = mount_points->CreateCrackedFileSystemURL( 301 kTestOrigin, 302 fileapi::kFileSystemTypeNativeLocal, 303 base::FilePath(FPL("c"))); 304 EXPECT_FALSE(native_local.is_valid()); 305 306 struct TestCase { 307 const base::FilePath::CharType* const path; 308 bool expect_valid; 309 fileapi::FileSystemType expect_type; 310 const base::FilePath::CharType* const expect_path; 311 const char* const expect_fs_id; 312 }; 313 314 const TestCase kTestCases[] = { 315 { FPL("c/d/e"), 316 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, 317 { FPL("c(1)/d/e"), 318 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)/d/e"), "c(1)" }, 319 { FPL("c(1)"), 320 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)"), "c(1)" }, 321 { FPL("empty_path/a"), 322 true, fileapi::kFileSystemTypeSyncable, FPL("a"), "empty_path" }, 323 { FPL("empty_path"), 324 true, fileapi::kFileSystemTypeSyncable, FPL(""), "empty_path" }, 325 { FPL("mount/a/b"), 326 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, 327 { FPL("mount"), 328 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root"), "mount" }, 329 { FPL("cc"), 330 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 331 { FPL(""), 332 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 333 { FPL(".."), 334 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 335 // Absolte paths. 336 { FPL("/c/d/e"), 337 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 338 { FPL("/c(1)/d/e"), 339 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 340 { FPL("/empty_path"), 341 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 342 // PAth references parent. 343 { FPL("c/d/../e"), 344 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 345 { FPL("/empty_path/a/../b"), 346 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 347 #if defined(FILE_PATH_USES_WIN_SEPARATORS) 348 { FPL("c/d\\e"), 349 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, 350 { FPL("mount\\a\\b"), 351 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, 352 #endif 353 }; 354 355 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { 356 FileSystemURL cracked = mount_points->CreateCrackedFileSystemURL( 357 kTestOrigin, 358 fileapi::kFileSystemTypeExternal, 359 base::FilePath(kTestCases[i].path)); 360 361 EXPECT_EQ(kTestCases[i].expect_valid, cracked.is_valid()) 362 << "Test case index: " << i; 363 364 if (!kTestCases[i].expect_valid) 365 continue; 366 367 EXPECT_EQ(kTestOrigin, cracked.origin()) 368 << "Test case index: " << i; 369 EXPECT_EQ(kTestCases[i].expect_type, cracked.type()) 370 << "Test case index: " << i; 371 EXPECT_EQ(base::FilePath( 372 kTestCases[i].expect_path).NormalizePathSeparators(), cracked.path()) 373 << "Test case index: " << i; 374 EXPECT_EQ(base::FilePath(kTestCases[i].path).NormalizePathSeparators(), 375 cracked.virtual_path()) 376 << "Test case index: " << i; 377 EXPECT_EQ(kTestCases[i].expect_fs_id, cracked.filesystem_id()) 378 << "Test case index: " << i; 379 EXPECT_EQ(fileapi::kFileSystemTypeExternal, cracked.mount_type()) 380 << "Test case index: " << i; 381 } 382 } 383 384 TEST(ExternalMountPointsTest, CrackVirtualPath) { 385 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 386 fileapi::ExternalMountPoints::CreateRefCounted()); 387 388 const GURL kTestOrigin("http://chromium.org"); 389 390 mount_points->RegisterFileSystem("c", 391 fileapi::kFileSystemTypeNativeLocal, 392 fileapi::FileSystemMountOption(), 393 base::FilePath(DRIVE FPL("/a/b/c"))); 394 mount_points->RegisterFileSystem("c(1)", 395 fileapi::kFileSystemTypeDrive, 396 fileapi::FileSystemMountOption(), 397 base::FilePath(DRIVE FPL("/a/b/c(1)"))); 398 mount_points->RegisterFileSystem("empty_path", 399 fileapi::kFileSystemTypeSyncable, 400 fileapi::FileSystemMountOption(), 401 base::FilePath()); 402 mount_points->RegisterFileSystem("mount", 403 fileapi::kFileSystemTypeDrive, 404 fileapi::FileSystemMountOption(), 405 base::FilePath(DRIVE FPL("/root"))); 406 407 struct TestCase { 408 const base::FilePath::CharType* const path; 409 bool expect_valid; 410 fileapi::FileSystemType expect_type; 411 const base::FilePath::CharType* const expect_path; 412 const char* const expect_name; 413 }; 414 415 const TestCase kTestCases[] = { 416 { FPL("c/d/e"), 417 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, 418 { FPL("c(1)/d/e"), 419 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)/d/e"), "c(1)" }, 420 { FPL("c(1)"), 421 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/a/b/c(1)"), "c(1)" }, 422 { FPL("empty_path/a"), 423 true, fileapi::kFileSystemTypeSyncable, FPL("a"), "empty_path" }, 424 { FPL("empty_path"), 425 true, fileapi::kFileSystemTypeSyncable, FPL(""), "empty_path" }, 426 { FPL("mount/a/b"), 427 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, 428 { FPL("mount"), 429 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root"), "mount" }, 430 { FPL("cc"), 431 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 432 { FPL(""), 433 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 434 { FPL(".."), 435 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 436 // Absolte paths. 437 { FPL("/c/d/e"), 438 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 439 { FPL("/c(1)/d/e"), 440 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 441 { FPL("/empty_path"), 442 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 443 // PAth references parent. 444 { FPL("c/d/../e"), 445 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 446 { FPL("/empty_path/a/../b"), 447 false, fileapi::kFileSystemTypeUnknown, FPL(""), "" }, 448 #if defined(FILE_PATH_USES_WIN_SEPARATORS) 449 { FPL("c/d\\e"), 450 true, fileapi::kFileSystemTypeNativeLocal, DRIVE FPL("/a/b/c/d/e"), "c" }, 451 { FPL("mount\\a\\b"), 452 true, fileapi::kFileSystemTypeDrive, DRIVE FPL("/root/a/b"), "mount" }, 453 #endif 454 }; 455 456 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { 457 std::string cracked_name; 458 fileapi::FileSystemType cracked_type; 459 base::FilePath cracked_path; 460 fileapi::FileSystemMountOption cracked_option; 461 EXPECT_EQ(kTestCases[i].expect_valid, 462 mount_points->CrackVirtualPath(base::FilePath(kTestCases[i].path), 463 &cracked_name, &cracked_type, &cracked_path, &cracked_option)) 464 << "Test case index: " << i; 465 466 if (!kTestCases[i].expect_valid) 467 continue; 468 469 EXPECT_EQ(kTestCases[i].expect_type, cracked_type) 470 << "Test case index: " << i; 471 EXPECT_EQ(base::FilePath( 472 kTestCases[i].expect_path).NormalizePathSeparators(), cracked_path) 473 << "Test case index: " << i; 474 EXPECT_EQ(kTestCases[i].expect_name, cracked_name) 475 << "Test case index: " << i; 476 } 477 } 478 479 TEST(ExternalMountPointsTest, MountOption) { 480 scoped_refptr<fileapi::ExternalMountPoints> mount_points( 481 fileapi::ExternalMountPoints::CreateRefCounted()); 482 483 mount_points->RegisterFileSystem( 484 "nosync", 485 fileapi::kFileSystemTypeNativeLocal, 486 fileapi::FileSystemMountOption(fileapi::COPY_SYNC_OPTION_NO_SYNC), 487 base::FilePath(DRIVE FPL("/nosync"))); 488 mount_points->RegisterFileSystem( 489 "sync", 490 fileapi::kFileSystemTypeNativeLocal, 491 fileapi::FileSystemMountOption(fileapi::COPY_SYNC_OPTION_SYNC), 492 base::FilePath(DRIVE FPL("/sync"))); 493 494 std::string name; 495 fileapi::FileSystemType type; 496 fileapi::FileSystemMountOption option; 497 base::FilePath path; 498 EXPECT_TRUE(mount_points->CrackVirtualPath( 499 base::FilePath(FPL("nosync/file")), &name, &type, &path, &option)); 500 EXPECT_EQ(fileapi::COPY_SYNC_OPTION_NO_SYNC, option.copy_sync_option()); 501 EXPECT_TRUE(mount_points->CrackVirtualPath( 502 base::FilePath(FPL("sync/file")), &name, &type, &path, &option)); 503 EXPECT_EQ(fileapi::COPY_SYNC_OPTION_SYNC, option.copy_sync_option()); 504 } 505 506 } // namespace 507 508