From bc9007ff8e0995007b639d4e7aa3cdc6930b44f5 Mon Sep 17 00:00:00 2001 From: wangchen Date: Sat, 12 Jul 2025 19:09:17 +0800 Subject: [PATCH] =?UTF-8?q?tdd=E6=95=B4=E6=94=B9=20close=20#ICLV1G=20Signe?= =?UTF-8?q?d-off-by:=20wangchen=20?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../unittest/policy_info_manager_test.cpp | 1 + .../unittest/sandbox_manager_service_test.cpp | 35 ++++++++++++++++++- 2 files changed, 35 insertions(+), 1 deletion(-) diff --git a/services/sandbox_manager/test/unittest/policy_info_manager_test.cpp b/services/sandbox_manager/test/unittest/policy_info_manager_test.cpp index 5c79a0f..52dd065 100644 --- a/services/sandbox_manager/test/unittest/policy_info_manager_test.cpp +++ b/services/sandbox_manager/test/unittest/policy_info_manager_test.cpp @@ -926,6 +926,7 @@ HWTEST_F(PolicyInfoManagerTest, PolicyInfoManagerTest012, TestSize.Level0) EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().UnSetAllPolicyByToken(selfTokenId_)); PolicyInfoManager::GetInstance().macAdapter_ = original; + original = mockMacAdapter; } } // SandboxManager } // AccessControl diff --git a/services/sandbox_manager/test/unittest/sandbox_manager_service_test.cpp b/services/sandbox_manager/test/unittest/sandbox_manager_service_test.cpp index 95a7b02..680cb44 100644 --- a/services/sandbox_manager/test/unittest/sandbox_manager_service_test.cpp +++ b/services/sandbox_manager/test/unittest/sandbox_manager_service_test.cpp @@ -599,6 +599,7 @@ HWTEST_F(SandboxManagerServiceTest, MemoryManagerTest002, TestSize.Level1) EXPECT_EQ(SA_READY_TO_UNLOAD, sandboxManagerService_->OnIdle(reason)); SandboxMemoryManager::GetInstance().SetIsDelayedToUnload(false); } +#endif /** * @tc.name: SandboxManagerServiceRawDataTest001 @@ -666,7 +667,39 @@ HWTEST_F(SandboxManagerServiceTest, SandboxManagerServiceRawDataTest002, TestSiz EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, sandboxManagerService_->SetPolicy(selfTokenId_, policyRawData1, policyFlag, resultRawData1)); } -#endif + +/** + * @tc.name: SandboxManagerServiceRawDataTest003 + * @tc.desc: Test Marshalling - large input coverage + * @tc.type: FUNC + * @tc.require: + */ +HWTEST_F(SandboxManagerServiceTest, SandboxManagerServiceRawDataTest003, TestSize.Level0) +{ + std::vector policy; + policy.resize(POLICY_VECTOR_LARGE_SIZE + 1); + PolicyVecRawData policyRawData1; + Uint32VecRawData resultRawData1; + BoolVecRawData resultRawData2; + policyRawData1.Marshalling(policy); + uint64_t tokenId = 1; + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->PersistPolicy(policyRawData1, resultRawData1)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->UnPersistPolicy(policyRawData1, resultRawData1)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->PersistPolicyByTokenId(tokenId, policyRawData1, resultRawData1)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->UnPersistPolicyByTokenId(tokenId, policyRawData1, resultRawData1)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->CheckPolicy(selfTokenId_, policyRawData1, resultRawData2)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->CheckPersistPolicy(selfTokenId_, policyRawData1, resultRawData2)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->StartAccessingPolicy(policyRawData1, resultRawData1)); + EXPECT_EQ(SANDBOX_MANAGER_SERVICE_PARCEL_ERR, + sandboxManagerService_->StopAccessingPolicy(policyRawData1, resultRawData1)); +} } // SandboxManager } // AccessControl } // OHOS \ No newline at end of file -- Gitee