From 25531535974e9ebb2e4ff2ca2a9beb3f6234a692 Mon Sep 17 00:00:00 2001 From: fundavid Date: Mon, 14 Apr 2025 11:29:51 +0800 Subject: [PATCH] unmarshall coverage & el5 module_name fixed Signed-off-by: fundavid --- .../inner_api/el5filekeymanager/test/BUILD.gn | 2 +- .../src/el5_filekey_manager_kit_unittest.cpp | 21 +++++++++++++++++++ services/el5filekeymanager/test/BUILD.gn | 6 +++--- 3 files changed, 25 insertions(+), 4 deletions(-) diff --git a/interfaces/inner_api/el5filekeymanager/test/BUILD.gn b/interfaces/inner_api/el5filekeymanager/test/BUILD.gn index 764d38de9..bc1b9052f 100644 --- a/interfaces/inner_api/el5filekeymanager/test/BUILD.gn +++ b/interfaces/inner_api/el5filekeymanager/test/BUILD.gn @@ -17,7 +17,7 @@ import("../../../../access_token.gni") ohos_unittest("el5_filekey_manager_kit_unittest") { subsystem_name = "accesscontrol" part_name = "access_token" - module_out_path = "access_token/access_token" + module_out_path = "access_token/el5_filekey_manager" sanitize = { cfi = true cfi_cross_dso = true diff --git a/interfaces/inner_api/el5filekeymanager/test/unittest/src/el5_filekey_manager_kit_unittest.cpp b/interfaces/inner_api/el5filekeymanager/test/unittest/src/el5_filekey_manager_kit_unittest.cpp index 07337f276..9dcf219fd 100644 --- a/interfaces/inner_api/el5filekeymanager/test/unittest/src/el5_filekey_manager_kit_unittest.cpp +++ b/interfaces/inner_api/el5filekeymanager/test/unittest/src/el5_filekey_manager_kit_unittest.cpp @@ -16,6 +16,7 @@ #include "el5_filekey_manager_kit_unittest.h" #include "accesstoken_kit.h" +#include "user_app_key_info.h" #include "el5_filekey_callback_interface_stub.h" #include "el5_filekey_manager_error.h" #include "el5_filekey_manager_kit.h" @@ -137,6 +138,26 @@ HWTEST_F(El5FilekeyManagerKitTest, GetUserAppKey001, TestSize.Level1) ASSERT_EQ(El5FilekeyManagerKit::GetUserAppKey(userId, keyInfos), EFM_ERR_NO_PERMISSION); } +/** + * @tc.name: UserAppKeyInfo001 + * @tc.desc: interface coverage + * @tc.type: FUNC + * @tc.require: issueI9JGMV + */ +HWTEST_F(El5FilekeyManagerKitTest, UserAppKeyInfo001, TestSize.Level0) +{ + std::string mockKeyInfo("mockKeyInfo"); + UserAppKeyInfo src(100, mockKeyInfo); + OHOS::Parcel parcel{}; + EXPECT_TRUE(src.Marshalling(parcel)); + + UserAppKeyInfo *dst = UserAppKeyInfo::Unmarshalling(parcel); + EXPECT_NE(dst, nullptr); + EXPECT_EQ(src.first, dst->first); + EXPECT_EQ(src.second, dst->second); + delete dst; +} + /** * @tc.name: ChangeUserAppkeysLoadInfo001 * @tc.desc: Change key infos of the specified user id without permission. diff --git a/services/el5filekeymanager/test/BUILD.gn b/services/el5filekeymanager/test/BUILD.gn index 9e94d9b2e..3bc0d39c9 100644 --- a/services/el5filekeymanager/test/BUILD.gn +++ b/services/el5filekeymanager/test/BUILD.gn @@ -18,7 +18,7 @@ if (is_standard_system && ability_base_enable == true) { ohos_unittest("el5_filekey_manager_service_mock_unittest") { subsystem_name = "accesscontrol" part_name = "access_token" - module_out_path = "access_token/access_token" + module_out_path = "access_token/el5_filekey_manager" sanitize = { cfi = true cfi_cross_dso = true @@ -85,7 +85,7 @@ if (is_standard_system && ability_base_enable == true) { ohos_unittest("el5_filekey_manager_service_unittest") { subsystem_name = "accesscontrol" part_name = "access_token" - module_out_path = "access_token/access_token" + module_out_path = "access_token/el5_filekey_manager" sanitize = { cfi = true cfi_cross_dso = true @@ -148,7 +148,7 @@ if (is_standard_system && ability_base_enable == true) { ohos_unittest("el5_filekey_manager_stub_unittest") { subsystem_name = "accesscontrol" part_name = "access_token" - module_out_path = "access_token/access_token" + module_out_path = "access_token/el5_filekey_manager" sanitize = { cfi = true cfi_cross_dso = true -- Gitee