diff --git a/interfaces/innerkits/accesstoken/test/unittest/src/accesstoken_kit_test.cpp b/interfaces/innerkits/accesstoken/test/unittest/src/accesstoken_kit_test.cpp index 418d300f549edad42094888790b838464c4ad987..1e80310926ee9a2b0050c5e2fcd87c437a3574b9 100644 --- a/interfaces/innerkits/accesstoken/test/unittest/src/accesstoken_kit_test.cpp +++ b/interfaces/innerkits/accesstoken/test/unittest/src/accesstoken_kit_test.cpp @@ -948,6 +948,21 @@ HWTEST_F(AccessTokenKitTest, GrantPermission003, TestSize.Level0) } } +/** + * @tc.name: GrantPermission004 + * @tc.desc: GrantPermission function abnormal branch + * @tc.type: FUNC + * @tc.require:Issue Number + */ +HWTEST_F(AccessTokenKitTest, GrantPermission004, TestSize.Level0) +{ + AccessTokenID tokenID = GetAccessTokenID(TEST_USER_ID, TEST_BUNDLE_NAME, 0); + ASSERT_NE(0, tokenID); + int invalidFlag = -1; + int ret = AccessTokenKit::GrantPermission(tokenID, TEST_PERMISSION_NAME_ALPHA, invalidFlag); + ASSERT_EQ(RET_FAILED, ret); +} + /** * @tc.name: RevokePermission001 * @tc.desc: Revoke permission that has ohos.permission.GRANT_SENSITIVE_PERMISSIONS @@ -1024,6 +1039,24 @@ HWTEST_F(AccessTokenKitTest, RevokePermission003, TestSize.Level0) } } +/** + * @tc.name: RevokePermission004 + * @tc.desc: Revoke permission abnormal branch + * @tc.type: FUNC + * @tc.require:Issue Number + */ +HWTEST_F(AccessTokenKitTest, RevokePermission004, TestSize.Level0) +{ + AccessTokenID tokenID = GetAccessTokenID(TEST_USER_ID, TEST_BUNDLE_NAME, 0); + ASSERT_NE(0, tokenID); + int invalidFlag = -1; + int ret = AccessTokenKit::RevokePermission(tokenID, TEST_PERMISSION_NAME_ALPHA, invalidFlag); + ASSERT_EQ(RET_FAILED, ret); + + ret = AccessTokenKit::RevokePermission(tokenID, TEST_PERMISSION_NAME_ALPHA, PERMISSION_USER_FIXED); + ASSERT_EQ(RET_SUCCESS, ret); +} + /** * @tc.name: ClearUserGrantedPermissionState001 * @tc.desc: Clear user/system granted permission after ClearUserGrantedPermissionState has been invoked. @@ -1156,6 +1189,32 @@ HWTEST_F(AccessTokenKitTest, GetTokenType001, TestSize.Level0) DeleteTestToken(); } +/** + * @tc.name: GetTokenType002 + * @tc.desc: get the token type abnormal branch. + * @tc.type: FUNC + * @tc.Issue Number + */ +HWTEST_F(AccessTokenKitTest, GetTokenType002, TestSize.Level0) +{ + AccessTokenID tokenID = 0; + int ret = AccessTokenKit::GetTokenType(tokenID); + ASSERT_EQ(TOKEN_INVALID, ret); +} + +/** + * @tc.name: GetHapDlpFlag001 + * @tc.desc: GetHapDlpFlag function abnormal branch. + * @tc.type: FUNC + * @tc.Issue Number + */ +HWTEST_F(AccessTokenKitTest, GetHapDlpFlag001, TestSize.Level0) +{ + AccessTokenID tokenID = 0; + int ret = AccessTokenKit::GetHapDlpFlag(tokenID); + ASSERT_EQ(INVALID_DLP_TOKEN_FLAG, ret); +} + /** * @tc.name: GetHapTokenInfo001 * @tc.desc: get the token info and verify. diff --git a/services/accesstokenmanager/test/unittest/cpp/src/accesstoken_info_manager_test.cpp b/services/accesstokenmanager/test/unittest/cpp/src/accesstoken_info_manager_test.cpp index 680c1fed545ccbec94060ed4a65c509917fac1fe..541b20a95aaef75bf4cf93cc0ca019f808a05f2a 100644 --- a/services/accesstokenmanager/test/unittest/cpp/src/accesstoken_info_manager_test.cpp +++ b/services/accesstokenmanager/test/unittest/cpp/src/accesstoken_info_manager_test.cpp @@ -481,8 +481,117 @@ HWTEST_F(AccessTokenInfoManagerTest, GetHapTokenInfoFromRemote001, TestSize.Leve ASSERT_EQ(RET_SUCCESS, ret); GTEST_LOG_(INFO) << "remove the token info"; } + +/** + * @tc.name: RemoteHapTest001001 + * @tc.desc: Verify the RemoteHap token function . + * @tc.type: FUNC + * @tc.require: Issue Number + */ +HWTEST_F(AccessTokenInfoManagerTest, RemoteHapTest001, TestSize.Level1) +{ + AccessTokenIDEx tokenIdEx = {0}; + int ret = AccessTokenInfoManager::GetInstance().CreateHapTokenInfo( + g_infoManagerTestInfoParms, g_infoManagerTestPolicyPrams, tokenIdEx); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "add a hap token"; + + std::string deviceId = "device_1"; + std::string deviceId2 = "device_2"; + AccessTokenID mapID = + AccessTokenInfoManager::GetInstance().AllocLocalTokenID(deviceId, tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(mapID == 0, true); + HapTokenInfoForSync hapSync; + ret = AccessTokenInfoManager::GetInstance().GetHapTokenInfoFromRemote(tokenIdEx.tokenIdExStruct.tokenID, hapSync); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().SetRemoteHapTokenInfo(deviceId, hapSync); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().DeleteRemoteDeviceTokens(deviceId); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().DeleteRemoteDeviceTokens(deviceId2); + ASSERT_EQ(RET_FAILED, ret); + + ret = AccessTokenInfoManager::GetInstance().RemoveHapTokenInfo(tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "remove the token info"; +} + +/** + * @tc.name: DeleteRemoteToken001 + * @tc.desc: Verify the DeleteRemoteToken normal and abnormal branch . + * @tc.type: FUNC + * @tc.require: Issue Number + */ +HWTEST_F(AccessTokenInfoManagerTest, DeleteRemoteToken001, TestSize.Level1) +{ + AccessTokenIDEx tokenIdEx = {0}; + int ret = AccessTokenInfoManager::GetInstance().CreateHapTokenInfo( + g_infoManagerTestInfoParms, g_infoManagerTestPolicyPrams, tokenIdEx); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "add a hap token"; + + std::string deviceId = "device_1"; + std::string deviceId2 = "device_2"; + AccessTokenID mapId = + AccessTokenInfoManager::GetInstance().AllocLocalTokenID(deviceId, tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(mapId == 0, true); + HapTokenInfoForSync hapSync; + ret = AccessTokenInfoManager::GetInstance().GetHapTokenInfoFromRemote(tokenIdEx.tokenIdExStruct.tokenID, hapSync); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().SetRemoteHapTokenInfo(deviceId, hapSync); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().DeleteRemoteToken(deviceId, tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(RET_SUCCESS, ret); + ret = AccessTokenInfoManager::GetInstance().DeleteRemoteToken(deviceId2, tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(RET_FAILED, ret); + + ret = AccessTokenInfoManager::GetInstance().RemoveHapTokenInfo(tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "remove the token info"; +} + +/** + * @tc.name: GetUdidByNodeId001 + * @tc.desc: Verify the GetUdidByNodeId abnormal branch . + * @tc.type: FUNC + * @tc.require: Issue Number + */ +HWTEST_F(AccessTokenInfoManagerTest, GetUdidByNodeId001, TestSize.Level1) +{ + std::string nodeId = "test"; + std::string result = AccessTokenInfoManager::GetInstance().GetUdidByNodeId(nodeId); + ASSERT_EQ(result.empty(), true); +} #endif +/** + * @tc.name: DumpTokenInfo001 + * @tc.desc: Verify the DumpTokenInfo hap token function . + * @tc.type: FUNC + * @tc.require: Issue Number + */ +HWTEST_F(AccessTokenInfoManagerTest, DumpTokenInfo001, TestSize.Level1) +{ + AccessTokenIDEx tokenIdEx = {0}; + int ret = AccessTokenInfoManager::GetInstance().CreateHapTokenInfo( + g_infoManagerTestInfoParms, g_infoManagerTestPolicyPrams, tokenIdEx); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "add a hap token"; + + std::string dumpInfo; + AccessTokenInfoManager::GetInstance().DumpTokenInfo(tokenIdEx.tokenIdExStruct.tokenID, dumpInfo); + ASSERT_EQ(dumpInfo.length() > 0, true); + GTEST_LOG_(INFO) << dumpInfo; + + ret = AccessTokenInfoManager::GetInstance().RemoveHapTokenInfo(tokenIdEx.tokenIdExStruct.tokenID); + ASSERT_EQ(RET_SUCCESS, ret); + GTEST_LOG_(INFO) << "remove the token info"; + + AccessTokenInfoManager::GetInstance().DumpTokenInfo(tokenIdEx.tokenIdExStruct.tokenID, dumpInfo); + ASSERT_EQ(dumpInfo.length() > 0, true); + GTEST_LOG_(INFO) << dumpInfo; +} + #ifdef SUPPORT_SANDBOX_APP static void PrepareJsonData1() { diff --git a/services/accesstokenmanager/test/unittest/cpp/src/native_token_receptor_test.cpp b/services/accesstokenmanager/test/unittest/cpp/src/native_token_receptor_test.cpp index 041d821bfe5392433885b2f47888cba5130bcce1..d9d5fa10af5557c2c3e185e23319b8df734e2ee9 100644 --- a/services/accesstokenmanager/test/unittest/cpp/src/native_token_receptor_test.cpp +++ b/services/accesstokenmanager/test/unittest/cpp/src/native_token_receptor_test.cpp @@ -358,6 +358,45 @@ HWTEST_F(NativeTokenReceptorTest, CheckNativeDCap001, TestSize.Level1) ASSERT_EQ(ret, RET_SUCCESS); } +#ifdef TOKEN_SYNC_ENABLE +/** + * @tc.name: GetAllNativeTokenInfo001 + * @tc.desc: Verify GetAllNativeTokenInfo normal and abnormal branch + * @tc.type: FUNC + * @tc.require: Issue Number + */ +HWTEST_F(NativeTokenReceptorTest, GetAllNativeTokenInfo001, TestSize.Level1) +{ + ACCESSTOKEN_LOG_INFO(LABEL, "GetAllNativeTokenInfo001!"); + + // test nativetokenInfo = nullptr + std::vector nativeVec; + std::vector> tokenInfos; + AccessTokenInfoManager::GetInstance().GetAllNativeTokenInfo(nativeVec); + ASSERT_EQ(!nativeVec.empty(), true); + + // test process one + NativeTokenInfo info = {.apl = APL_NORMAL, + .ver = 1, + .processName = "native_token_test0", + .tokenID = 0x28100000, + .tokenAttr = 0, + .dcap = {"AT_CAP", "ST_CAP"}}; + + std::vector permStateList = {}; + std::shared_ptr nativeToken = std::make_shared(info, permStateList); + tokenInfos.emplace_back(nativeToken); + AccessTokenInfoManager::GetInstance().ProcessNativeTokenInfos(tokenInfos); + AccessTokenInfoManager::GetInstance().GetAllNativeTokenInfo(nativeVec); + ASSERT_EQ(!nativeVec.empty(), true); + AccessTokenID resultTokenId = AccessTokenInfoManager::GetInstance().GetNativeTokenId("native_token_test0"); + ASSERT_EQ(resultTokenId, info.tokenID); + + int ret = AccessTokenInfoManager::GetInstance().RemoveNativeTokenInfo(info.tokenID); + ASSERT_EQ(ret, RET_SUCCESS); +} + +#endif /** * @tc.name: ProcessNativeTokenInfos002 * @tc.desc: test add two native tokens.