Remove stale references to PlatformFile flags, errors or functions.
BUG=322664
Review URL: https://codereview.chromium.org/318753007
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@275258 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc
index d5115ebe..f25adfc4 100644
--- a/content/browser/child_process_security_policy_unittest.cc
+++ b/content/browser/child_process_security_policy_unittest.cc
@@ -7,7 +7,6 @@
#include "base/basictypes.h"
#include "base/files/file_path.h"
-#include "base/platform_file.h"
#include "content/browser/child_process_security_policy_impl.h"
#include "content/public/common/url_constants.h"
#include "content/test/test_content_browser_client.h"
@@ -467,130 +466,130 @@
// Grant permissions for a file.
p->Add(kRendererID);
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
GrantPermissionsForFile(p, kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_OPEN_TRUNCATED |
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE);
+ base::File::FLAG_OPEN |
+ base::File::FLAG_OPEN_TRUNCATED |
+ base::File::FLAG_READ |
+ base::File::FLAG_WRITE);
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_OPEN_TRUNCATED |
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_OPEN_TRUNCATED |
+ base::File::FLAG_READ |
+ base::File::FLAG_WRITE));
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_CREATE));
+ base::File::FLAG_CREATE));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file, 0));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_CREATE |
- base::PLATFORM_FILE_OPEN_TRUNCATED |
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_CREATE |
+ base::File::FLAG_OPEN_TRUNCATED |
+ base::File::FLAG_READ |
+ base::File::FLAG_WRITE));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, sibling_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, parent_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_traversal1,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_traversal2,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, evil_traversal1,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, evil_traversal2,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
// CPSP doesn't allow this case for the sake of simplicity.
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, self_traversal,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
p->Remove(kRendererID);
// Grant permissions for the directory the file is in.
p->Add(kRendererID);
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
GrantPermissionsForFile(p, kRendererID, parent_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ);
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ);
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_READ |
+ base::File::FLAG_WRITE));
p->Remove(kRendererID);
// Grant permissions for the directory the file is in (with trailing '/').
p->Add(kRendererID);
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
GrantPermissionsForFile(p, kRendererID, parent_slash_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ);
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ);
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_READ |
+ base::File::FLAG_WRITE));
// Grant permissions for the file (should overwrite the permissions granted
// for the directory).
GrantPermissionsForFile(p, kRendererID, granted_file,
- base::PLATFORM_FILE_TEMPORARY);
+ base::File::FLAG_TEMPORARY);
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_TEMPORARY));
+ base::File::FLAG_TEMPORARY));
// Revoke all permissions for the file (it should inherit its permissions
// from the directory again).
p->RevokeAllPermissionsForFile(kRendererID, granted_file);
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_TEMPORARY));
+ base::File::FLAG_TEMPORARY));
p->Remove(kRendererID);
// Grant file permissions for the file to main thread renderer process,
// make sure its worker thread renderer process inherits those.
p->Add(kRendererID);
GrantPermissionsForFile(p, kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ);
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ);
EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_WRITE));
p->AddWorker(kWorkerRendererID, kRendererID);
EXPECT_TRUE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
EXPECT_FALSE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
- base::PLATFORM_FILE_WRITE));
+ base::File::FLAG_WRITE));
p->Remove(kRendererID);
EXPECT_FALSE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_READ));
+ base::File::FLAG_OPEN |
+ base::File::FLAG_READ));
p->Remove(kWorkerRendererID);
p->Add(kRendererID);
GrantPermissionsForFile(p, kRendererID, relative_file,
- base::PLATFORM_FILE_OPEN);
+ base::File::FLAG_OPEN);
EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, relative_file,
- base::PLATFORM_FILE_OPEN));
+ base::File::FLAG_OPEN));
p->Remove(kRendererID);
}