1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/browser/download/base_file.h"
7 #include "base/files/file.h"
8 #include "base/files/file_util.h"
9 #include "base/files/scoped_temp_dir.h"
10 #include "base/logging.h"
11 #include "base/message_loop/message_loop.h"
12 #include "base/strings/string_number_conversions.h"
13 #include "base/test/test_file_util.h"
14 #include "content/browser/browser_thread_impl.h"
15 #include "content/public/browser/download_interrupt_reasons.h"
16 #include "crypto/secure_hash.h"
17 #include "crypto/sha2.h"
18 #include "testing/gtest/include/gtest/gtest.h"
23 const char kTestData1
[] = "Let's write some data to the file!\n";
24 const char kTestData2
[] = "Writing more data.\n";
25 const char kTestData3
[] = "Final line.";
26 const char kTestData4
[] = "supercalifragilisticexpialidocious";
27 const int kTestDataLength1
= arraysize(kTestData1
) - 1;
28 const int kTestDataLength2
= arraysize(kTestData2
) - 1;
29 const int kTestDataLength3
= arraysize(kTestData3
) - 1;
30 const int kTestDataLength4
= arraysize(kTestData4
) - 1;
31 const int kElapsedTimeSeconds
= 5;
32 const base::TimeDelta kElapsedTimeDelta
= base::TimeDelta::FromSeconds(
37 class BaseFileTest
: public testing::Test
{
39 static const unsigned char kEmptySha256Hash
[crypto::kSHA256Length
];
42 : expect_file_survives_(false),
43 expect_in_progress_(true),
44 expected_error_(DOWNLOAD_INTERRUPT_REASON_NONE
),
45 file_thread_(BrowserThread::FILE, &message_loop_
) {
48 void SetUp() override
{
50 ASSERT_TRUE(temp_dir_
.CreateUniqueTempDir());
51 base_file_
.reset(new BaseFile(base::FilePath(),
61 void TearDown() override
{
62 EXPECT_FALSE(base_file_
->in_progress());
63 if (!expected_error_
) {
64 EXPECT_EQ(static_cast<int64
>(expected_data_
.size()),
65 base_file_
->bytes_so_far());
68 base::FilePath full_path
= base_file_
->full_path();
70 if (!expected_data_
.empty() && !expected_error_
) {
71 // Make sure the data has been properly written to disk.
72 std::string disk_data
;
73 EXPECT_TRUE(base::ReadFileToString(full_path
, &disk_data
));
74 EXPECT_EQ(expected_data_
, disk_data
);
77 // Make sure the mock BrowserThread outlives the BaseFile to satisfy
78 // thread checks inside it.
81 EXPECT_EQ(expect_file_survives_
, base::PathExists(full_path
));
85 secure_hash_
.reset(crypto::SecureHash::Create(crypto::SecureHash::SHA256
));
86 memcpy(sha256_hash_
, kEmptySha256Hash
, crypto::kSHA256Length
);
89 void UpdateHash(const char* data
, size_t length
) {
90 secure_hash_
->Update(data
, length
);
93 std::string
GetFinalHash() {
95 secure_hash_
->Finish(sha256_hash_
, crypto::kSHA256Length
);
96 hash
.assign(reinterpret_cast<const char*>(sha256_hash_
),
97 sizeof(sha256_hash_
));
101 void MakeFileWithHash() {
102 base_file_
.reset(new BaseFile(base::FilePath(),
109 net::BoundNetLog()));
112 bool InitializeFile() {
113 DownloadInterruptReason result
= base_file_
->Initialize(temp_dir_
.path());
114 EXPECT_EQ(expected_error_
, result
);
115 return result
== DOWNLOAD_INTERRUPT_REASON_NONE
;
118 bool AppendDataToFile(const std::string
& data
) {
119 EXPECT_EQ(expect_in_progress_
, base_file_
->in_progress());
120 DownloadInterruptReason result
=
121 base_file_
->AppendDataToFile(data
.data(), data
.size());
122 if (result
== DOWNLOAD_INTERRUPT_REASON_NONE
)
123 EXPECT_TRUE(expect_in_progress_
) << " result = " << result
;
125 EXPECT_EQ(expected_error_
, result
);
126 if (base_file_
->in_progress()) {
127 expected_data_
+= data
;
128 if (expected_error_
== DOWNLOAD_INTERRUPT_REASON_NONE
) {
129 EXPECT_EQ(static_cast<int64
>(expected_data_
.size()),
130 base_file_
->bytes_so_far());
133 return result
== DOWNLOAD_INTERRUPT_REASON_NONE
;
136 void set_expected_data(const std::string
& data
) { expected_data_
= data
; }
139 // Create a file. Returns the complete file path.
140 base::FilePath
CreateTestFile() {
141 base::FilePath file_name
;
142 BaseFile
file(base::FilePath(),
151 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
152 file
.Initialize(temp_dir_
.path()));
153 file_name
= file
.full_path();
154 EXPECT_NE(base::FilePath::StringType(), file_name
.value());
156 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
157 file
.AppendDataToFile(kTestData4
, kTestDataLength4
));
159 // Keep the file from getting deleted when existing_file_name is deleted.
165 // Create a file with the specified file name.
166 void CreateFileWithName(const base::FilePath
& file_name
) {
167 EXPECT_NE(base::FilePath::StringType(), file_name
.value());
168 BaseFile
duplicate_file(file_name
,
176 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
177 duplicate_file
.Initialize(temp_dir_
.path()));
178 // Write something into it.
179 duplicate_file
.AppendDataToFile(kTestData4
, kTestDataLength4
);
180 // Detach the file so it isn't deleted on destruction of |duplicate_file|.
181 duplicate_file
.Detach();
184 int64
CurrentSpeedAtTime(base::TimeTicks current_time
) {
185 EXPECT_TRUE(base_file_
.get());
186 return base_file_
->CurrentSpeedAtTime(current_time
);
189 base::TimeTicks
StartTick() {
190 EXPECT_TRUE(base_file_
.get());
191 return base_file_
->start_tick_
;
194 void set_expected_error(DownloadInterruptReason err
) {
195 expected_error_
= err
;
198 void ExpectPermissionError(DownloadInterruptReason err
) {
199 EXPECT_TRUE(err
== DOWNLOAD_INTERRUPT_REASON_FILE_TRANSIENT_ERROR
||
200 err
== DOWNLOAD_INTERRUPT_REASON_FILE_ACCESS_DENIED
)
201 << "Interrupt reason = " << err
;
205 // BaseClass instance we are testing.
206 scoped_ptr
<BaseFile
> base_file_
;
208 // Temporary directory for renamed downloads.
209 base::ScopedTempDir temp_dir_
;
211 // Expect the file to survive deletion of the BaseFile instance.
212 bool expect_file_survives_
;
214 // Expect the file to be in progress.
215 bool expect_in_progress_
;
218 scoped_ptr
<crypto::SecureHash
> secure_hash_
;
220 unsigned char sha256_hash_
[crypto::kSHA256Length
];
223 // Keep track of what data should be saved to the disk file.
224 std::string expected_data_
;
225 DownloadInterruptReason expected_error_
;
227 // Mock file thread to satisfy debug checks in BaseFile.
228 base::MessageLoop message_loop_
;
229 BrowserThreadImpl file_thread_
;
232 // This will initialize the entire array to zero.
233 const unsigned char BaseFileTest::kEmptySha256Hash
[] = { 0 };
235 // Test the most basic scenario: just create the object and do a sanity check
236 // on all its accessors. This is actually a case that rarely happens
237 // in production, where we would at least Initialize it.
238 TEST_F(BaseFileTest
, CreateDestroy
) {
239 EXPECT_EQ(base::FilePath().value(), base_file_
->full_path().value());
242 // Cancel the download explicitly.
243 TEST_F(BaseFileTest
, Cancel
) {
244 ASSERT_TRUE(InitializeFile());
245 EXPECT_TRUE(base::PathExists(base_file_
->full_path()));
246 base_file_
->Cancel();
247 EXPECT_FALSE(base::PathExists(base_file_
->full_path()));
248 EXPECT_NE(base::FilePath().value(), base_file_
->full_path().value());
251 // Write data to the file and detach it, so it doesn't get deleted
252 // automatically when base_file_ is destructed.
253 TEST_F(BaseFileTest
, WriteAndDetach
) {
254 ASSERT_TRUE(InitializeFile());
255 ASSERT_TRUE(AppendDataToFile(kTestData1
));
256 base_file_
->Finish();
257 base_file_
->Detach();
258 expect_file_survives_
= true;
261 // Write data to the file and detach it, and calculate its sha256 hash.
262 TEST_F(BaseFileTest
, WriteWithHashAndDetach
) {
263 // Calculate the final hash.
265 UpdateHash(kTestData1
, kTestDataLength1
);
266 std::string expected_hash
= GetFinalHash();
267 std::string expected_hash_hex
=
268 base::HexEncode(expected_hash
.data(), expected_hash
.size());
271 ASSERT_TRUE(InitializeFile());
272 ASSERT_TRUE(AppendDataToFile(kTestData1
));
273 base_file_
->Finish();
276 base_file_
->GetHash(&hash
);
277 EXPECT_EQ("0B2D3F3F7943AD64B860DF94D05CB56A8A97C6EC5768B5B70B930C5AA7FA9ADE",
279 EXPECT_EQ(expected_hash_hex
, base::HexEncode(hash
.data(), hash
.size()));
281 base_file_
->Detach();
282 expect_file_survives_
= true;
285 // Rename the file after writing to it, then detach.
286 TEST_F(BaseFileTest
, WriteThenRenameAndDetach
) {
287 ASSERT_TRUE(InitializeFile());
289 base::FilePath
initial_path(base_file_
->full_path());
290 EXPECT_TRUE(base::PathExists(initial_path
));
291 base::FilePath
new_path(temp_dir_
.path().AppendASCII("NewFile"));
292 EXPECT_FALSE(base::PathExists(new_path
));
294 ASSERT_TRUE(AppendDataToFile(kTestData1
));
296 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
, base_file_
->Rename(new_path
));
297 EXPECT_FALSE(base::PathExists(initial_path
));
298 EXPECT_TRUE(base::PathExists(new_path
));
300 base_file_
->Finish();
301 base_file_
->Detach();
302 expect_file_survives_
= true;
305 // Write data to the file once.
306 TEST_F(BaseFileTest
, SingleWrite
) {
307 ASSERT_TRUE(InitializeFile());
308 ASSERT_TRUE(AppendDataToFile(kTestData1
));
309 base_file_
->Finish();
312 // Write data to the file multiple times.
313 TEST_F(BaseFileTest
, MultipleWrites
) {
314 ASSERT_TRUE(InitializeFile());
315 ASSERT_TRUE(AppendDataToFile(kTestData1
));
316 ASSERT_TRUE(AppendDataToFile(kTestData2
));
317 ASSERT_TRUE(AppendDataToFile(kTestData3
));
319 EXPECT_FALSE(base_file_
->GetHash(&hash
));
320 base_file_
->Finish();
323 // Write data to the file once and calculate its sha256 hash.
324 TEST_F(BaseFileTest
, SingleWriteWithHash
) {
325 // Calculate the final hash.
327 UpdateHash(kTestData1
, kTestDataLength1
);
328 std::string expected_hash
= GetFinalHash();
329 std::string expected_hash_hex
=
330 base::HexEncode(expected_hash
.data(), expected_hash
.size());
333 ASSERT_TRUE(InitializeFile());
334 // Can get partial hash states before Finish() is called.
335 EXPECT_STRNE(std::string().c_str(), base_file_
->GetHashState().c_str());
336 ASSERT_TRUE(AppendDataToFile(kTestData1
));
337 EXPECT_STRNE(std::string().c_str(), base_file_
->GetHashState().c_str());
338 base_file_
->Finish();
341 base_file_
->GetHash(&hash
);
342 EXPECT_EQ(expected_hash_hex
, base::HexEncode(hash
.data(), hash
.size()));
345 // Write data to the file multiple times and calculate its sha256 hash.
346 TEST_F(BaseFileTest
, MultipleWritesWithHash
) {
347 // Calculate the final hash.
349 UpdateHash(kTestData1
, kTestDataLength1
);
350 UpdateHash(kTestData2
, kTestDataLength2
);
351 UpdateHash(kTestData3
, kTestDataLength3
);
352 std::string expected_hash
= GetFinalHash();
353 std::string expected_hash_hex
=
354 base::HexEncode(expected_hash
.data(), expected_hash
.size());
358 ASSERT_TRUE(InitializeFile());
359 ASSERT_TRUE(AppendDataToFile(kTestData1
));
360 ASSERT_TRUE(AppendDataToFile(kTestData2
));
361 ASSERT_TRUE(AppendDataToFile(kTestData3
));
362 // No hash before Finish() is called.
363 EXPECT_FALSE(base_file_
->GetHash(&hash
));
364 base_file_
->Finish();
366 EXPECT_TRUE(base_file_
->GetHash(&hash
));
367 EXPECT_EQ("CBF68BF10F8003DB86B31343AFAC8C7175BD03FB5FC905650F8C80AF087443A8",
369 EXPECT_EQ(expected_hash_hex
, base::HexEncode(hash
.data(), hash
.size()));
372 // Write data to the file multiple times, interrupt it, and continue using
373 // another file. Calculate the resulting combined sha256 hash.
374 TEST_F(BaseFileTest
, MultipleWritesInterruptedWithHash
) {
375 // Calculate the final hash.
377 UpdateHash(kTestData1
, kTestDataLength1
);
378 UpdateHash(kTestData2
, kTestDataLength2
);
379 UpdateHash(kTestData3
, kTestDataLength3
);
380 std::string expected_hash
= GetFinalHash();
381 std::string expected_hash_hex
=
382 base::HexEncode(expected_hash
.data(), expected_hash
.size());
385 ASSERT_TRUE(InitializeFile());
387 ASSERT_TRUE(AppendDataToFile(kTestData1
));
388 ASSERT_TRUE(AppendDataToFile(kTestData2
));
389 // Get the hash state and file name.
390 std::string hash_state
;
391 hash_state
= base_file_
->GetHashState();
393 base_file_
->Finish();
395 base::FilePath
new_file_path(temp_dir_
.path().Append(
396 base::FilePath(FILE_PATH_LITERAL("second_file"))));
398 ASSERT_TRUE(base::CopyFile(base_file_
->full_path(), new_file_path
));
400 // Create another file
401 BaseFile
second_file(new_file_path
,
404 base_file_
->bytes_so_far(),
409 ASSERT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
410 second_file
.Initialize(base::FilePath()));
411 std::string
data(kTestData3
);
412 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
413 second_file
.AppendDataToFile(data
.data(), data
.size()));
414 second_file
.Finish();
417 EXPECT_TRUE(second_file
.GetHash(&hash
));
418 // This will fail until getting the hash state is supported in SecureHash.
419 EXPECT_STREQ(expected_hash_hex
.c_str(),
420 base::HexEncode(hash
.data(), hash
.size()).c_str());
423 // Rename the file after all writes to it.
424 TEST_F(BaseFileTest
, WriteThenRename
) {
425 ASSERT_TRUE(InitializeFile());
427 base::FilePath
initial_path(base_file_
->full_path());
428 EXPECT_TRUE(base::PathExists(initial_path
));
429 base::FilePath
new_path(temp_dir_
.path().AppendASCII("NewFile"));
430 EXPECT_FALSE(base::PathExists(new_path
));
432 ASSERT_TRUE(AppendDataToFile(kTestData1
));
434 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
,
435 base_file_
->Rename(new_path
));
436 EXPECT_FALSE(base::PathExists(initial_path
));
437 EXPECT_TRUE(base::PathExists(new_path
));
439 base_file_
->Finish();
442 // Rename the file while the download is still in progress.
443 TEST_F(BaseFileTest
, RenameWhileInProgress
) {
444 ASSERT_TRUE(InitializeFile());
446 base::FilePath
initial_path(base_file_
->full_path());
447 EXPECT_TRUE(base::PathExists(initial_path
));
448 base::FilePath
new_path(temp_dir_
.path().AppendASCII("NewFile"));
449 EXPECT_FALSE(base::PathExists(new_path
));
451 ASSERT_TRUE(AppendDataToFile(kTestData1
));
453 EXPECT_TRUE(base_file_
->in_progress());
454 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
, base_file_
->Rename(new_path
));
455 EXPECT_FALSE(base::PathExists(initial_path
));
456 EXPECT_TRUE(base::PathExists(new_path
));
458 ASSERT_TRUE(AppendDataToFile(kTestData2
));
460 base_file_
->Finish();
463 // Test that a failed rename reports the correct error.
464 TEST_F(BaseFileTest
, RenameWithError
) {
465 ASSERT_TRUE(InitializeFile());
467 // TestDir is a subdirectory in |temp_dir_| that we will make read-only so
468 // that the rename will fail.
469 base::FilePath
test_dir(temp_dir_
.path().AppendASCII("TestDir"));
470 ASSERT_TRUE(base::CreateDirectory(test_dir
));
472 base::FilePath
new_path(test_dir
.AppendASCII("TestFile"));
473 EXPECT_FALSE(base::PathExists(new_path
));
476 base::FilePermissionRestorer
restore_permissions_for(test_dir
);
477 ASSERT_TRUE(base::MakeFileUnwritable(test_dir
));
478 ExpectPermissionError(base_file_
->Rename(new_path
));
481 base_file_
->Finish();
484 // Test that if a rename fails for an in-progress BaseFile, it remains writeable
486 TEST_F(BaseFileTest
, RenameWithErrorInProgress
) {
487 ASSERT_TRUE(InitializeFile());
489 base::FilePath
test_dir(temp_dir_
.path().AppendASCII("TestDir"));
490 ASSERT_TRUE(base::CreateDirectory(test_dir
));
492 base::FilePath
new_path(test_dir
.AppendASCII("TestFile"));
493 EXPECT_FALSE(base::PathExists(new_path
));
495 // Write some data to start with.
496 ASSERT_TRUE(AppendDataToFile(kTestData1
));
497 ASSERT_TRUE(base_file_
->in_progress());
499 base::FilePath old_path
= base_file_
->full_path();
502 base::FilePermissionRestorer
restore_permissions_for(test_dir
);
503 ASSERT_TRUE(base::MakeFileUnwritable(test_dir
));
504 ExpectPermissionError(base_file_
->Rename(new_path
));
506 // The file should still be open and we should be able to continue writing
508 ASSERT_TRUE(base_file_
->in_progress());
509 ASSERT_TRUE(AppendDataToFile(kTestData2
));
510 ASSERT_EQ(old_path
.value(), base_file_
->full_path().value());
512 // Try to rename again, just for kicks. It should still fail.
513 ExpectPermissionError(base_file_
->Rename(new_path
));
516 // Now that TestDir is writeable again, we should be able to successfully
518 EXPECT_EQ(DOWNLOAD_INTERRUPT_REASON_NONE
, base_file_
->Rename(new_path
));
519 ASSERT_EQ(new_path
.value(), base_file_
->full_path().value());
520 ASSERT_TRUE(AppendDataToFile(kTestData3
));
522 base_file_
->Finish();
524 // The contents of the file should be intact.
525 std::string file_contents
;
526 std::string
expected_contents(kTestData1
);
527 expected_contents
+= kTestData2
;
528 expected_contents
+= kTestData3
;
529 ASSERT_TRUE(base::ReadFileToString(new_path
, &file_contents
));
530 EXPECT_EQ(expected_contents
, file_contents
);
533 // Test that a failed write reports an error.
534 TEST_F(BaseFileTest
, WriteWithError
) {
536 ASSERT_TRUE(base::CreateTemporaryFile(&path
));
538 // Pass a file handle which was opened without the WRITE flag.
539 // This should result in an error when writing.
540 base::File
file(path
, base::File::FLAG_OPEN_ALWAYS
| base::File::FLAG_READ
);
541 base_file_
.reset(new BaseFile(path
,
548 net::BoundNetLog()));
549 ASSERT_TRUE(InitializeFile());
551 set_expected_error(DOWNLOAD_INTERRUPT_REASON_FILE_ACCESS_DENIED
);
552 #elif defined (OS_POSIX)
553 set_expected_error(DOWNLOAD_INTERRUPT_REASON_FILE_FAILED
);
555 ASSERT_FALSE(AppendDataToFile(kTestData1
));
556 base_file_
->Finish();
559 // Try to write to uninitialized file.
560 TEST_F(BaseFileTest
, UninitializedFile
) {
561 expect_in_progress_
= false;
562 set_expected_error(DOWNLOAD_INTERRUPT_REASON_FILE_FAILED
);
563 EXPECT_FALSE(AppendDataToFile(kTestData1
));
566 // Create two |BaseFile|s with the same file, and attempt to write to both.
567 // Overwrite base_file_ with another file with the same name and
568 // non-zero contents, and make sure the last file to close 'wins'.
569 TEST_F(BaseFileTest
, DuplicateBaseFile
) {
570 ASSERT_TRUE(InitializeFile());
572 // Create another |BaseFile| referring to the file that |base_file_| owns.
573 CreateFileWithName(base_file_
->full_path());
575 ASSERT_TRUE(AppendDataToFile(kTestData1
));
576 base_file_
->Finish();
579 // Create a file and append to it.
580 TEST_F(BaseFileTest
, AppendToBaseFile
) {
581 // Create a new file.
582 base::FilePath existing_file_name
= CreateTestFile();
584 set_expected_data(kTestData4
);
586 // Use the file we've just created.
587 base_file_
.reset(new BaseFile(existing_file_name
,
594 net::BoundNetLog()));
596 ASSERT_TRUE(InitializeFile());
598 const base::FilePath file_name
= base_file_
->full_path();
599 EXPECT_NE(base::FilePath::StringType(), file_name
.value());
601 // Write into the file.
602 EXPECT_TRUE(AppendDataToFile(kTestData1
));
604 base_file_
->Finish();
605 base_file_
->Detach();
606 expect_file_survives_
= true;
609 // Create a read-only file and attempt to write to it.
610 TEST_F(BaseFileTest
, ReadonlyBaseFile
) {
611 // Create a new file.
612 base::FilePath readonly_file_name
= CreateTestFile();
614 // Restore permissions to the file when we are done with this test.
615 base::FilePermissionRestorer
restore_permissions(readonly_file_name
);
617 // Make it read-only.
618 EXPECT_TRUE(base::MakeFileUnwritable(readonly_file_name
));
620 // Try to overwrite it.
621 base_file_
.reset(new BaseFile(readonly_file_name
,
628 net::BoundNetLog()));
630 expect_in_progress_
= false;
631 set_expected_error(DOWNLOAD_INTERRUPT_REASON_FILE_ACCESS_DENIED
);
632 EXPECT_FALSE(InitializeFile());
634 const base::FilePath file_name
= base_file_
->full_path();
635 EXPECT_NE(base::FilePath::StringType(), file_name
.value());
637 // Write into the file.
638 set_expected_error(DOWNLOAD_INTERRUPT_REASON_FILE_FAILED
);
639 EXPECT_FALSE(AppendDataToFile(kTestData1
));
641 base_file_
->Finish();
642 base_file_
->Detach();
643 expect_file_survives_
= true;
646 TEST_F(BaseFileTest
, IsEmptyHash
) {
647 std::string
empty(crypto::kSHA256Length
, '\x00');
648 EXPECT_TRUE(BaseFile::IsEmptyHash(empty
));
649 std::string
not_empty(crypto::kSHA256Length
, '\x01');
650 EXPECT_FALSE(BaseFile::IsEmptyHash(not_empty
));
651 EXPECT_FALSE(BaseFile::IsEmptyHash(std::string()));
653 std::string also_not_empty
= empty
;
654 also_not_empty
[crypto::kSHA256Length
- 1] = '\x01';
655 EXPECT_FALSE(BaseFile::IsEmptyHash(also_not_empty
));
658 // Test that a temporary file is created in the default download directory.
659 TEST_F(BaseFileTest
, CreatedInDefaultDirectory
) {
660 ASSERT_TRUE(base_file_
->full_path().empty());
661 ASSERT_TRUE(InitializeFile());
662 EXPECT_FALSE(base_file_
->full_path().empty());
664 // On Windows, CreateTemporaryFileInDir() will cause a path with short names
665 // to be expanded into a path with long names. Thus temp_dir.path() might not
666 // be a string-wise match to base_file_->full_path().DirName() even though
667 // they are in the same directory.
668 base::FilePath temp_file
;
669 ASSERT_TRUE(base::CreateTemporaryFileInDir(temp_dir_
.path(), &temp_file
));
670 ASSERT_FALSE(temp_file
.empty());
671 EXPECT_STREQ(temp_file
.DirName().value().c_str(),
672 base_file_
->full_path().DirName().value().c_str());
673 base_file_
->Finish();
676 TEST_F(BaseFileTest
, NoDoubleDeleteAfterCancel
) {
677 ASSERT_TRUE(InitializeFile());
678 base::FilePath full_path
= base_file_
->full_path();
679 ASSERT_FALSE(full_path
.empty());
680 ASSERT_TRUE(base::PathExists(full_path
));
682 base_file_
->Cancel();
683 ASSERT_FALSE(base::PathExists(full_path
));
685 const char kData
[] = "hello";
686 const int kDataLength
= static_cast<int>(arraysize(kData
) - 1);
687 ASSERT_EQ(kDataLength
, base::WriteFile(full_path
, kData
, kDataLength
));
688 // The file that we created here should stick around when the BaseFile is
689 // destroyed during TearDown.
690 expect_file_survives_
= true;
693 } // namespace content