1 /*
2 * Copyright (c) 2022-2025 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "UTTest_device_manager_service.h"
17
18 #include "accesstoken_kit.h"
19 #include "dm_constants.h"
20 #include "dm_device_info.h"
21 #include "dm_log.h"
22 #include "nativetoken_kit.h"
23 #include "token_setproc.h"
24 #include "softbus_common.h"
25 #include "softbus_error_code.h"
26
27 using namespace OHOS::Security::AccessToken;
28 using namespace testing;
29 using namespace testing::ext;
30 namespace OHOS {
31 namespace DistributedHardware {
32 DM_IMPLEMENT_SINGLE_INSTANCE(DeviceManagerService);
33
SetUp()34 void DeviceManagerServiceTest::SetUp()
35 {
36 const int32_t permsNum = 4;
37 const int32_t indexZero = 0;
38 const int32_t indexOne = 1;
39 const int32_t indexTwo = 2;
40 const int32_t indexThree = 3;
41 uint64_t tokenId;
42 const char *perms[permsNum];
43 perms[indexZero] = "ohos.permission.DISTRIBUTED_SOFTBUS_CENTER";
44 perms[indexOne] = "ohos.permission.DISTRIBUTED_DATASYNC";
45 perms[indexTwo] = "ohos.permission.ACCESS_SERVICE_DM";
46 perms[indexThree] = "ohos.permission.MONITOR_DEVICE_NETWORK_STATE";
47 NativeTokenInfoParams infoInstance = {
48 .dcapsNum = 0,
49 .permsNum = permsNum,
50 .aclsNum = 0,
51 .dcaps = NULL,
52 .perms = perms,
53 .acls = NULL,
54 .processName = "dsoftbus_service",
55 .aplStr = "system_core",
56 };
57 tokenId = GetAccessTokenId(&infoInstance);
58 SetSelfTokenID(tokenId);
59 OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
60 }
61
TearDown()62 void DeviceManagerServiceTest::TearDown()
63 {
64 Mock::VerifyAndClearExpectations(permissionManagerMock_.get());
65 Mock::VerifyAndClearExpectations(softbusListenerMock_.get());
66 Mock::VerifyAndClearExpectations(kVAdapterManagerMock_.get());
67 Mock::VerifyAndClearExpectations(appManagerMock_.get());
68 Mock::VerifyAndClearExpectations(deviceManagerServiceImplMock_.get());
69 Mock::VerifyAndClearExpectations(softbusCacheMock_.get());
70 Mock::VerifyAndClearExpectations(cryptoMock_.get());
71 Mock::VerifyAndClearExpectations(multipleUserConnectorMock_.get());
72 Mock::VerifyAndClearExpectations(dMCommToolMock_.get());
73 Mock::VerifyAndClearExpectations(deviceProfileConnectorMock_.get());
74 Mock::VerifyAndClearExpectations(deviceNameManagerMock_.get());
75 }
76
SetUpTestCase()77 void DeviceManagerServiceTest::SetUpTestCase()
78 {
79 DmPermissionManager::dmPermissionManager = permissionManagerMock_;
80 DmSoftbusListener::dmSoftbusListener = softbusListenerMock_;
81 DmKVAdapterManager::dmKVAdapterManager = kVAdapterManagerMock_;
82 DmAppManager::dmAppManager = appManagerMock_;
83 DmDeviceManagerServiceImpl::dmDeviceManagerServiceImpl = deviceManagerServiceImplMock_;
84 DmSoftbusCache::dmSoftbusCache = softbusCacheMock_;
85 DmCrypto::dmCrypto = cryptoMock_;
86 DmMultipleUserConnector::dmMultipleUserConnector = multipleUserConnectorMock_;
87 DmDMCommTool::dmDMCommTool = dMCommToolMock_;
88 DmDeviceProfileConnector::dmDeviceProfileConnector = deviceProfileConnectorMock_;
89 DmDeviceNameManager::dmDeviceNameManager_ = deviceNameManagerMock_;
90 }
91
TearDownTestCase()92 void DeviceManagerServiceTest::TearDownTestCase()
93 {
94 DmPermissionManager::dmPermissionManager = nullptr;
95 permissionManagerMock_ = nullptr;
96 DmSoftbusListener::dmSoftbusListener = nullptr;
97 softbusListenerMock_ = nullptr;
98 DmKVAdapterManager::dmKVAdapterManager = nullptr;
99 kVAdapterManagerMock_ = nullptr;
100 DmAppManager::dmAppManager = nullptr;
101 appManagerMock_ = nullptr;
102 DmDeviceManagerServiceImpl::dmDeviceManagerServiceImpl = nullptr;
103 deviceManagerServiceImplMock_ = nullptr;
104 DmSoftbusCache::dmSoftbusCache = nullptr;
105 softbusCacheMock_ = nullptr;
106 DmCrypto::dmCrypto = nullptr;
107 cryptoMock_ = nullptr;
108 DmMultipleUserConnector::dmMultipleUserConnector = nullptr;
109 multipleUserConnectorMock_ = nullptr;
110 DmDMCommTool::dmDMCommTool = nullptr;
111 dMCommToolMock_ = nullptr;
112 DmDeviceProfileConnector::dmDeviceProfileConnector = nullptr;
113 deviceProfileConnectorMock_ = nullptr;
114 DmDeviceNameManager::dmDeviceNameManager_ = nullptr;
115 deviceNameManagerMock_ = nullptr;
116 }
117
118 namespace {
DeletePermission()119 void DeletePermission()
120 {
121 const int32_t permsNum = 1;
122 const int32_t indexZero = 0;
123 uint64_t tokenId;
124 const char *perms[permsNum];
125 perms[indexZero] = "ohos.permission";
126 NativeTokenInfoParams infoInstance = {
127 .dcapsNum = 0,
128 .permsNum = permsNum,
129 .aclsNum = 0,
130 .dcaps = NULL,
131 .perms = perms,
132 .acls = NULL,
133 .processName = "DeviceManagerServiceTest",
134 .aplStr = "system_core",
135 };
136 tokenId = GetAccessTokenId(&infoInstance);
137 SetSelfTokenID(tokenId);
138 OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
139 }
140
141 /**
142 * @tc.name: InitDMServiceListener_001
143 * @tc.desc: Init device manager listener and return DM_OK
144 * @tc.type: FUNC
145 * @tc.require: AR000GHSJK
146 */
147 HWTEST_F(DeviceManagerServiceTest, InitDMServiceListener_001, testing::ext::TestSize.Level1)
148 {
149 int ret = DeviceManagerService::GetInstance().InitDMServiceListener();
150 EXPECT_EQ(ret, DM_OK);
151 DeviceManagerService::GetInstance().UninitDMServiceListener();
152 }
153
154 /**
155 * @tc.name: PublishDeviceDiscovery_001
156 * @tc.desc: Publish device discovery and return ERR_DM_NO_PERMISSION
157 * @tc.type: FUNC
158 * @tc.require: I5N1K3
159 */
160 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_001, testing::ext::TestSize.Level1)
161 {
162 DeletePermission();
163 std::string pkgName = "com.ohos.test12";
164 DmPublishInfo publishInfo;
165 publishInfo.publishId = 1;
166 publishInfo.mode = DM_DISCOVER_MODE_ACTIVE;
167 publishInfo.freq = DM_HIGH;
168 publishInfo.ranging = 1;
169 int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
170 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
171 DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishInfo.publishId);
172 }
173
174 /**
175 * @tc.name: PublishDeviceDiscovery_002
176 * @tc.desc: Empty pkgName of PublishDeviceDiscovery and return ERR_DM_INPUT_PARA_INVALID
177 * @tc.type: FUNC
178 * @tc.require: I5N1K3
179 */
180 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_002, testing::ext::TestSize.Level1)
181 {
182 std::string pkgName;
183 DmPublishInfo publishInfo;
184 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
185 int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
186 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
187 }
188
189 /**
190 * @tc.name: PublishDeviceDiscovery_003
191 * @tc.desc: Call PublishDeviceDiscovery twice with pkgName not null and flag bit not false and return
192 * SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM
193 * @tc.type: FUNC
194 * @tc.require: I5N1K3
195 */
196 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_003, testing::ext::TestSize.Level1)
197 {
198 std::string pkgName = "com.ohos.test";
199 DmPublishInfo publishInfo;
200 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillRepeatedly(Return(true));
201 int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
202 pkgName = "1com.ohos.test1";
203 ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
204 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
205 }
206
207 /**
208 * @tc.name: PublishDeviceDiscovery_004
209 * @tc.desc: Call PublishDeviceDiscovery twice with pkgName not null and flag bit not false and return
210 * SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM
211 * @tc.type: FUNC
212 * @tc.require: I5N1K3
213 */
214 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_004, testing::ext::TestSize.Level1)
215 {
216 std::string pkgName = "PublishDeviceDiscovery_004";
217 DmPublishInfo publishInfo;
218 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillRepeatedly(Return(true));
219 DeviceManagerService::GetInstance().InitDMServiceListener();
220 int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
221 pkgName = "1com.ohos.test1";
222 ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
223 EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM || ret == DM_OK);
224 DeviceManagerService::GetInstance().UninitDMServiceListener();
225 }
226
227 /**
228 * @tc.name: UnPublishDeviceDiscovery_001
229 * @tc.desc: UnPublish device discovery and return SOFTBUS_ERR
230 * @tc.type: FUNC
231 * @tc.require: I5N1K3
232 */
233 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_001, testing::ext::TestSize.Level1)
234 {
235 std::string pkgName = "com.ohos.test";
236 int32_t publishId = 1;
237 int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
238 EXPECT_NE(ret, DM_OK);
239 }
240
241 /**
242 * @tc.name: UnPublishDeviceDiscovery_002
243 * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
244 * @tc.type: FUNC
245 * @tc.require: I5N1K3
246 */
247 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_002, testing::ext::TestSize.Level1)
248 {
249 std::string pkgName;
250 int32_t publishId = 1;
251 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
252 DeviceManagerService::GetInstance().InitDMServiceListener();
253 int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
254 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
255 DeviceManagerService::GetInstance().UninitDMServiceListener();
256 }
257
258 /**
259 * @tc.name: UnPublishDeviceDiscovery_003
260 * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
261 * @tc.type: FUNC
262 * @tc.require: I5N1K3
263 */
264 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_003, testing::ext::TestSize.Level1)
265 {
266 std::string pkgName = "com.ohos.test003";
267 int32_t publishId = 1;
268 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
269 DeviceManagerService::GetInstance().InitDMServiceListener();
270 int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
271 EXPECT_TRUE(ret == SOFTBUS_DISCOVER_COAP_STOP_PUBLISH_FAIL || ret == SOFTBUS_ERR ||
272 ret == ERR_DM_INPUT_PARA_INVALID);
273 DeviceManagerService::GetInstance().UninitDMServiceListener();
274 }
275
276 /**
277 * @tc.name: UnPublishDeviceDiscovery_004
278 * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
279 * @tc.type: FUNC
280 * @tc.require: I5N1K3
281 */
282 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_004, testing::ext::TestSize.Level1)
283 {
284 std::string pkgName = "com.ohos.test003";
285 int32_t publishId = 1;
286 int32_t userId = 23;
287 std::string accountId = "hello123";
288 int32_t preUserId = 3;
289 std::vector<std::string> peerUdids;
290 std::string accountName = "openharmony123";
291 std::map<std::string, int32_t> curUserDeviceMap;
292 std::map<std::string, int32_t> preUserDeviceMap;
293 std::multimap<std::string, int32_t> curMultiMap;
294 std::string commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_USER_SWITCHED;
295 DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
296 commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_HWID_LOGIN;
297 DMAccountInfo dmAccountInfo;
298 DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
299 commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_HWID_LOGOUT;
300 EXPECT_CALL(*multipleUserConnectorMock_, GetAccountInfoByUserId(_)).WillOnce(Return(dmAccountInfo));
301 DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
302 commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_USER_REMOVED;
303 EXPECT_CALL(*deviceManagerServiceImplMock_, GetDeviceIdAndUserId(_)).WillOnce(Return(curMultiMap));
304 DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
305 commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_BOOT_COMPLETED;
306 DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
307 DeviceManagerService::GetInstance().HandleAccountLogout(userId, accountId, pkgName);
308 EXPECT_CALL(*deviceManagerServiceImplMock_, GetDeviceIdAndUserId(_)).WillOnce(Return(curMultiMap));
309 DeviceManagerService::GetInstance().HandleUserRemoved(preUserId);
310 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
311 DeviceManagerService::GetInstance().SendAccountLogoutBroadCast(peerUdids, accountId, accountName, userId);
312 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
313 DeletePermission();
314 int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
315 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
316 }
317
318 /**
319 * @tc.name: GetTrustedDeviceList_001
320 * @tc.desc:Set the intFlag of GetTrustedDeviceList to true and pkgName = null; Return ERR_DM_INPUT_PARA_INVALID
321 * @tc.type: FUNC
322 * @tc.require: AR000GHSJK
323 */
324 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_001, testing::ext::TestSize.Level1)
325 {
326 std::string pkgName;
327 std::string extra = "jdddd";
328 std::vector<DmDeviceInfo> deviceList;
329 int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
330 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
331 }
332
333 /**
334 * @tc.name: GetTrustedDeviceList_002
335 * @tc.desc:Set the intFlag of GetTrustedDeviceList to true; Return DM_OK
336 * @tc.type: FUNC
337 * @tc.require: AR000GHSJK
338 */
339 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_002, testing::ext::TestSize.Level1)
340 {
341 std::string pkgName = "ohos_test";
342 std::string extra = "jdddd";
343 std::vector<DmDeviceInfo> deviceList;
344 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
345 int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
346 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
347 }
348
349 /**
350 * @tc.name: GetTrustedDeviceList_003
351 * @tc.desc:Set the intFlag of GetTrustedDeviceList to true; Return DM_OK
352 * @tc.type: FUNC
353 * @tc.require: AR000GHSJK
354 */
355 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_003, testing::ext::TestSize.Level1)
356 {
357 std::string pkgName = "ohos_test";
358 std::string extra = "jdddd";
359 std::vector<DmDeviceInfo> deviceList;
360 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
361 DeviceManagerService::GetInstance().InitDMServiceListener();
362 EXPECT_CALL(*softbusListenerMock_, GetTrustedDeviceList(_)).WillOnce(Return(DM_OK));
363 int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
364 EXPECT_EQ(ret, DM_OK);
365 DeviceManagerService::GetInstance().UninitDMServiceListener();
366 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
367 }
368
369 /**
370 * @tc.name: ShiftLNNGear_001
371 * @tc.desc:Set the pkgName to null, callerId not to null, and isRefresh to true; Return ERR_DM_INPUT_PARA_INVALID
372 * @tc.type: FUNC
373 * @tc.require: AR000GHSJK
374 */
375 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_001, testing::ext::TestSize.Level1)
376 {
377 std::string pkgName;
378 std::string callerId = "com.ohos.test";
379 bool isRefresh = true;
380 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
381 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
382 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
383 }
384
385 /**
386 * @tc.name: ShiftLNNGear_002
387 * @tc.desc:Set the callerId to null, pkgNamenot not to null, and isRefresh to true; Return ERR_DM_INPUT_PARA_INVALID
388 * @tc.type: FUNC
389 * @tc.require: AR000GHSJK
390 */
391 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_002, testing::ext::TestSize.Level1)
392 {
393 std::string pkgName = "com.ohos.test";
394 std::string callerId;
395 bool isRefresh = true;
396 std::vector<DmDeviceInfo> deviceList;
397 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
398 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
399 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
400 }
401
402 /**
403 * @tc.name: ShiftLNNGear_003
404 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return DM_OK
405 * @tc.type: FUNC
406 * @tc.require: AR000GHSJK
407 */
408 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_003, testing::ext::TestSize.Level1)
409 {
410 const int32_t permsNum = 1;
411 const int32_t indexZero = 0;
412 uint64_t tokenId;
413 const char *perms[permsNum];
414 perms[indexZero] = "ohos.permission";
415 NativeTokenInfoParams infoInstance = {
416 .dcapsNum = 0,
417 .permsNum = permsNum,
418 .aclsNum = 0,
419 .dcaps = NULL,
420 .perms = perms,
421 .acls = NULL,
422 .processName = "DeviceManagerServiceTest",
423 .aplStr = "system_core",
424 };
425 tokenId = GetAccessTokenId(&infoInstance);
426 SetSelfTokenID(tokenId);
427 std::string pkgName = "com.ohos.test";
428 std::string callerId = "com.ohos.test";
429 bool isRefresh = true;
430 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
431 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
432 EXPECT_NE(ret, DM_OK);
433 }
434
435 /**
436 * @tc.name: ShiftLNNGear_004
437 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to false; Return DM_OK
438 * @tc.type: FUNC
439 * @tc.require: AR000GHSJK
440 */
441 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_004, testing::ext::TestSize.Level1)
442 {
443 const int32_t permsNum = 1;
444 const int32_t indexZero = 0;
445 uint64_t tokenId;
446 const char *perms[permsNum];
447 perms[indexZero] = "ohos.permission";
448 NativeTokenInfoParams infoInstance = {
449 .dcapsNum = 0,
450 .permsNum = permsNum,
451 .aclsNum = 0,
452 .dcaps = NULL,
453 .perms = perms,
454 .acls = NULL,
455 .processName = "DeviceManagerServiceTest",
456 .aplStr = "system_core",
457 };
458 tokenId = GetAccessTokenId(&infoInstance);
459 SetSelfTokenID(tokenId);
460 std::string pkgName = "com.ohos.test";
461 std::string callerId = "com.ohos.test";
462 bool isRefresh = false;
463 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
464 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
465 }
466
467 /**
468 * @tc.name: ShiftLNNGear_005
469 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to false; Return DM_OK
470 * @tc.type: FUNC
471 * @tc.require: AR000GHSJK
472 */
473 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_005, testing::ext::TestSize.Level1)
474 {
475 std::string pkgName = "com.ohos.test";
476 std::string callerId = "com.ohos.test";
477 bool isRefresh = false;
478 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
479 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
480 EXPECT_EQ(ret, DM_OK);
481 }
482
483 /**
484 * @tc.name: ShiftLNNGear_006
485 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
486 * @tc.type: FUNC
487 * @tc.require: AR000GHSJK
488 */
489 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_006, testing::ext::TestSize.Level1)
490 {
491 std::string pkgName = "ShiftLNNGear_006";
492 std::string callerId = "ShiftLNNGear_006";
493 bool isRefresh = true;
494 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
495 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
496 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
497 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
498 }
499
500 /**
501 * @tc.name: ShiftLNNGear_007
502 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
503 * @tc.type: FUNC
504 * @tc.require: AR000GHSJK
505 */
506 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_007, testing::ext::TestSize.Level1)
507 {
508 std::string pkgName = "ShiftLNNGear_007";
509 std::string callerId = "ShiftLNNGear_007";
510 bool isRefresh = true;
511 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
512 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
513 EXPECT_CALL(*softbusListenerMock_, ShiftLNNGear(_, _)).WillOnce(Return(ERR_DM_FAILED));
514 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
515 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
516 EXPECT_EQ(ret, ERR_DM_FAILED);
517 }
518
519 /**
520 * @tc.name: AuthenticateDevice_001
521 * @tc.desc: Set unsupport authType = 0 and return ERR_DM_INPUT_PARA_INVALID
522 * @tc.type: FUNC
523 * @tc.require: AR000GHSJK
524 */
525 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_001, testing::ext::TestSize.Level1)
526 {
527 std::string pkgName = "com.ohos.test";
528 std::string extra = "jdddd";
529 int32_t authType = 1;
530 std::string deviceId;
531 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
532 int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
533 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
534 }
535
536 /**
537 * @tc.name: AuthenticateDevice_002
538 * @tc.desc: Set intFlag for GAuthenticateDevice to True and pkgName to null; Return ERR_DM_INPUT_PARA_INVALID
539 * @tc.type: FUNC
540 * @tc.require: AR000GHSJK
541 */
542 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_002, testing::ext::TestSize.Level1)
543 {
544 std::string pkgName;
545 std::string extra = "jdddd";
546 int32_t authType = 0;
547 std::string deviceId = " 2345";
548 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
549 int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
550 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
551 }
552
553 /**
554 * @tc.name: AuthenticateDevice_003
555 * @tc.desc: Set intFlag for GAuthenticateDevice to True and deviceId to null; Return ERR_DM_BIND_INPUT_PARA_INVALID
556 * @tc.type: FUNC
557 * @tc.require: AR000GHSJK
558 */
559 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_003, testing::ext::TestSize.Level1)
560 {
561 std::string pkgName = "com.ohos.test";
562 std::string extra = "jdddd";
563 int32_t authType = 0;
564 std::string deviceId = " 2345";
565 EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
566 EXPECT_CALL(*softbusListenerMock_,
567 GetTargetInfoFromCache(_, _, _)).WillOnce(Return(ERR_DM_BIND_INPUT_PARA_INVALID));
568 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
569 int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
570 EXPECT_EQ(ret, ERR_DM_BIND_INPUT_PARA_INVALID);
571 }
572
573 /**
574 * @tc.name: AuthenticateDevice_004
575 * @tc.desc: Set intFlag for GAuthenticateDevice to True and deviceId to null; Return ERR_DM_NO_PERMISSION
576 * @tc.type: FUNC
577 * @tc.require: AR000GHSJK
578 */
579 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_004, testing::ext::TestSize.Level1)
580 {
581 std::string pkgName = "com.ohos.test";
582 std::string extra = "jdddd";
583 int32_t authType = 0;
584 std::string deviceId = " 2345";
585 DeletePermission();
586 int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
587 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
588 }
589
590 /**
591 * @tc.name: UnAuthenticateDevice_001
592 * @tc.desc: 将UnAuthenticateDevice的intFlag设置为false,设置pkgName = "com.ohos.test";Return ERR_DM_NO_PERMISSION
593 * @tc.type: FUNC
594 * @tc.require: AR000GHSJK
595 */
596 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_001, testing::ext::TestSize.Level1)
597 {
598 DeletePermission();
599 std::string pkgName = "com.ohos.test";
600 std::string networkId = "12345";
601 int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
602 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
603 }
604
605 /**
606 * @tc.name: UnAuthenticateDevice_002
607 * @tc.desc: Set intFlag for UnAuthenticateDevice to True and pkgName to null; Return ERR_DM_INPUT_PARA_INVALID
608 * @tc.type: FUNC
609 * @tc.require: AR000GHSJK
610 */
611 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_002, testing::ext::TestSize.Level1)
612 {
613 std::string pkgName;
614 std::string networkId = "12345";
615 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
616 int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
617 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
618 }
619
620 /**
621 * @tc.name: UnAuthenticateDevice_003
622 * @tc.desc: Set intFlag for UnAuthenticateDevice to true and pkgName to com.ohos.test; set deviceId null ,The return
623 * value is ERR_DM_INPUT_PARA_INVALID
624 * @tc.type: FUNC
625 * @tc.require: AR000GHSJK
626 */
627 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_003, testing::ext::TestSize.Level1)
628 {
629 std::string pkgName = "com.ohos.test";
630 std::string networkId;
631 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
632 int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
633 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
634 }
635
636 /**
637 * @tc.name: UnAuthenticateDevice_004
638 * @tc.desc: Set intFlag for UnAuthenticateDevice to true and pkgName to com.ohos.test; set deviceId null ,The return
639 * value is SOFTBUS_IPC_ERR
640 * @tc.type: FUNC
641 * @tc.require: AR000GHSJK
642 */
643 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_004, testing::ext::TestSize.Level1)
644 {
645 std::string pkgName = "com.ohos.test";
646 std::string networkId = "12345";
647 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
648 EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_FAILED));
649 int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
650 EXPECT_EQ(ret, ERR_DM_FAILED);
651 }
652
653 /**
654 * @tc.name: GetUdidByNetworkId_001
655 * @tc.desc: Make success for GetUdidByNetworkId,The return value is
656 * SOFTBUS_IPC_ERR
657 * @tc.type: FUNC
658 * @tc.require: AR000GHSJK
659 */
660 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_001, testing::ext::TestSize.Level1)
661 {
662 std::string pkgName = "com.ohos.test";
663 std::string netWorkId = "123";
664 std::string udid = "123";
665 EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(SOFTBUS_IPC_ERR));
666 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
667 int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
668 EXPECT_EQ(ret, SOFTBUS_IPC_ERR);
669 }
670
671 /**
672 * @tc.name: GetUdidByNetworkId_002
673 * @tc.desc: Make not init for GetUdidByNetworkId,The return value is
674 * ERR_DM_INPUT_PARA_INVALID
675 * @tc.type: FUNC
676 * @tc.require: AR000GHSJK
677 */
678 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_002, testing::ext::TestSize.Level1)
679 {
680 std::string pkgName;
681 std::string netWorkId = "111";
682 std::string udid = "2222";
683 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
684 int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
685 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
686 }
687
688 /**
689 * @tc.name: GetUdidByNetworkId_003
690 * @tc.desc: Make pkgName empty for GetUdidByNetworkId,The return value is
691 * ERR_DM_INPUT_PARA_INVALID
692 * @tc.type: FUNC
693 * @tc.require: AR000GHSJK
694 */
695 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_003, testing::ext::TestSize.Level1)
696 {
697 std::string pkgName = "pkgName";
698 std::string netWorkId = "";
699 std::string udid = "";
700 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
701 int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
702 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
703 }
704
705 /**
706 * @tc.name: GetUdidByNetworkId_004
707 * @tc.desc: Make pkgName empty for GetUdidByNetworkId,The return value is
708 * ERR_DM_INPUT_PARA_INVALID
709 * @tc.type: FUNC
710 * @tc.require: AR000GHSJK
711 */
712 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_004, testing::ext::TestSize.Level1)
713 {
714 std::string pkgName = "pkgName";
715 std::string netWorkId = "123";
716 std::string udid = "123";
717 DeletePermission();
718 int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
719 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
720 }
721
722 /**
723 * @tc.name: GetUuidByNetworkId_001
724 * @tc.desc: Make success for GetUuidByNetworkId,The return value is
725 * SOFTBUS_IPC_ERR
726 * @tc.type: FUNC
727 * @tc.require: AR000GHSJK
728 */
729 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_001, testing::ext::TestSize.Level1)
730 {
731 std::string pkgName = "com.ohos.test";
732 std::string netWorkId = "12";
733 std::string uuid = "12";
734 EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(SOFTBUS_IPC_ERR));
735 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
736 int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
737 EXPECT_EQ(ret, SOFTBUS_IPC_ERR);
738 }
739
740 /**
741 * @tc.name: GetUuidByNetworkId_002
742 * @tc.desc: Make not init for GetUuidByNetworkId,The return value is
743 * ERR_DM_INPUT_PARA_INVALID
744 * @tc.type: FUNC
745 * @tc.require: AR000GHSJK
746 */
747 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_002, testing::ext::TestSize.Level1)
748 {
749 std::string pkgName;
750 std::string netWorkId = "12";
751 std::string uuid = "21";
752 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
753 int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
754 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
755 }
756
757 /**
758 * @tc.name: GetUuidByNetworkId_003
759 * @tc.desc: Make pkgName empty for GetUuidByNetworkId,The return value is
760 * ERR_DM_INPUT_PARA_INVALID
761 * @tc.type: FUNC
762 * @tc.require: AR000GHSJK
763 */
764 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_003, testing::ext::TestSize.Level1)
765 {
766 std::string pkgName = "com.ohos.test";
767 std::string netWorkId = "";
768 std::string uuid = "";
769 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
770 int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
771 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
772 }
773
774 /**
775 * @tc.name: GetUuidByNetworkId_004
776 * @tc.desc: Make pkgName empty for GetUuidByNetworkId,The return value is
777 * ERR_DM_INPUT_PARA_INVALID
778 * @tc.type: FUNC
779 * @tc.require: AR000GHSJK
780 */
781 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_004, testing::ext::TestSize.Level1)
782 {
783 std::string pkgName = "com.ohos.test";
784 std::string netWorkId = "";
785 std::string uuid = "";
786 DeletePermission();
787 int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
788 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
789 }
790
791 /**
792 * @tc.name: SetUserOperation_001
793 * @tc.desc: Make success for SetUserOperation,The return value is
794 * ERR_DM_NO_PERMISSION
795 * @tc.type: FUNC
796 * @tc.require: AR000GHSJK
797 */
798 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_001, testing::ext::TestSize.Level1)
799 {
800 DeletePermission();
801 std::string pkgName = "com.ohos.test";
802 int32_t action = 0;
803 const std::string param = "{\"test\": \"extra\"}";;
804 int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
805 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
806 }
807
808 /**
809 * @tc.name: SetUserOperation_002
810 * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
811 * ERR_DM_INPUT_PARA_INVALID
812 * @tc.type: FUNC
813 * @tc.require: AR000GHSJK
814 */
815 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_002, testing::ext::TestSize.Level1)
816 {
817 std::string pkgName = "";
818 int32_t action = 0;
819 const std::string param = "{\"test\": \"extra\"}";
820 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
821 int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
822 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
823 }
824
825 /**
826 * @tc.name: SetUserOperation_003
827 * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
828 * ERR_DM_INPUT_PARA_INVALID
829 * @tc.type: FUNC
830 * @tc.require: AR000GHSJK
831 */
832 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_003, testing::ext::TestSize.Level1)
833 {
834 std::string pkgName = "pkgName";
835 int32_t action = 0;
836 const std::string param;
837 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
838 int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
839 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
840 }
841
842 /**
843 * @tc.name: SetUserOperation_004
844 * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
845 * DM_OK
846 * @tc.type: FUNC
847 * @tc.require: AR000GHSJK
848 */
849 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_004, testing::ext::TestSize.Level1)
850 {
851 std::string pkgName = "pkgName";
852 int32_t action = 0;
853 const std::string param = R"({"test":"extra"})";
854 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
855 int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
856 EXPECT_EQ(ret, DM_OK);
857 }
858
859 /**
860 * @tc.name: GetLocalDeviceInfo_001
861 * @tc.desc: The return value is DM_OK
862 * @tc.type: FUNC
863 * @tc.require: AR000GHSJK
864 */
865 HWTEST_F(DeviceManagerServiceTest, GetLocalDeviceInfo_001, testing::ext::TestSize.Level1)
866 {
867 DmDeviceInfo info;
868 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
869 int32_t ret = DeviceManagerService::GetInstance().GetLocalDeviceInfo(info);
870 EXPECT_EQ(ret, DM_OK);
871 }
872
873 /**
874 * @tc.name: RequestCredential_001
875 * @tc.desc:The return value is ERR_DM_FAILED
876 * @tc.type: FUNC
877 * @tc.require: AR000GHSJK
878 */
879 HWTEST_F(DeviceManagerServiceTest, RequestCredential_001, testing::ext::TestSize.Level1)
880 {
881 const std::string reqJsonStr = "test";
882 std::string returnJsonStr = "returntest";
883 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
884 int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
885 EXPECT_EQ(ret, ERR_DM_FAILED);
886 }
887
888 /**
889 * @tc.name: RequestCredential_002
890 * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
891 * @tc.type: FUNC
892 * @tc.require: AR000GHSJK
893 */
894 HWTEST_F(DeviceManagerServiceTest, RequestCredential_002, testing::ext::TestSize.Level1)
895 {
896 const std::string reqJsonStr = "";
897 std::string returnJsonStr = "returntest";
898 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
899 int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
900 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
901 }
902
903 /**
904 * @tc.name: RequestCredential_003
905 * @tc.desc:The return value is ERR_DM_FAILED
906 * @tc.type: FUNC
907 * @tc.require: AR000GHSJK
908 */
909 HWTEST_F(DeviceManagerServiceTest, RequestCredential_003, testing::ext::TestSize.Level1)
910 {
911 const std::string reqJsonStr = "test";
912 std::string returnJsonStr = "returntest";
913 DeletePermission();
914 int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
915 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
916 }
917
918 /**
919 * @tc.name: ImportCredential_001
920 * @tc.desc:The return value is ERR_DM_FAILED
921 * @tc.type: FUNC
922 * @tc.require: AR000GHSJK
923 */
924 HWTEST_F(DeviceManagerServiceTest, ImportCredential_001, testing::ext::TestSize.Level1)
925 {
926 const std::string pkgName = "pkgNametest";
927 const std::string credentialInfo = "credentialInfotest";
928 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
929 int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
930 EXPECT_EQ(ret, ERR_DM_FAILED);
931 }
932
933 /**
934 * @tc.name: ImportCredential_002
935 * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
936 * @tc.type: FUNC
937 * @tc.require: AR000GHSJK
938 */
939 HWTEST_F(DeviceManagerServiceTest, ImportCredential_002, testing::ext::TestSize.Level1)
940 {
941 const std::string pkgName = "";
942 const std::string credentialInfo = "";
943 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
944 int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
945 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
946 }
947
948 /**
949 * @tc.name: ImportCredential_003
950 * @tc.desc:The return value is ERR_DM_FAILED
951 * @tc.type: FUNC
952 * @tc.require: AR000GHSJK
953 */
954 HWTEST_F(DeviceManagerServiceTest, ImportCredential_003, testing::ext::TestSize.Level1)
955 {
956 const std::string pkgName = "pkgNametest";
957 const std::string credentialInfo = "credentialInfotest";
958 DeletePermission();
959 int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
960 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
961 }
962
963 /**
964 * @tc.name: DeleteCredential_001
965 * @tc.desc:The return value is ERR_DM_FAILED
966 * @tc.type: FUNC
967 * @tc.require: AR000GHSJK
968 */
969 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_001, testing::ext::TestSize.Level1)
970 {
971 const std::string pkgName = "pkgNametest";
972 const std::string deleteInfo = "deleteInfotest";
973 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
974 int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
975 EXPECT_EQ(ret, ERR_DM_FAILED);
976 }
977
978 /**
979 * @tc.name: DeleteCredential_002
980 * @tc.desc:The return value is ERR_DM_NO_PERMISSION
981 * @tc.type: FUNC
982 * @tc.require: AR000GHSJK
983 */
984 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_002, testing::ext::TestSize.Level1)
985 {
986 const std::string pkgName = "pkgNametest";
987 const std::string deleteInfo = "deleteInfotest";
988 DeletePermission();
989 int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
990 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
991 }
992
993 /**
994 * @tc.name: DeleteCredential_003
995 * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
996 * @tc.type: FUNC
997 * @tc.require: AR000GHSJK
998 */
999 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_003, testing::ext::TestSize.Level1)
1000 {
1001 const std::string pkgName = "";
1002 const std::string deleteInfo = "";
1003 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1004 int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
1005 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1006 }
1007
1008 /**
1009 * @tc.name: RegisterCredentialCallback_001
1010 * @tc.desc: The return value is DM_OK
1011 * @tc.type: FUNC
1012 * @tc.require: AR000GHSJK
1013 */
1014 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_001, testing::ext::TestSize.Level1)
1015 {
1016 const std::string pkgName = "pkgNametest";
1017 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1018 int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1019 EXPECT_EQ(ret, DM_OK);
1020 }
1021
1022 /**
1023 * @tc.name: RegisterCredentialCallback_002
1024 * @tc.desc: The return value is ERR_DM_INPUT_PARA_INVALID
1025 * @tc.type: FUNC
1026 * @tc.require: AR000GHSJK
1027 */
1028 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_002, testing::ext::TestSize.Level1)
1029 {
1030 const std::string pkgName = "";
1031 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1032 int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1033 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1034 }
1035
1036 /**
1037 * @tc.name: RegisterCredentialCallback_003
1038 * @tc.desc: The return value is ERR_DM_NO_PERMISSION
1039 * @tc.type: FUNC
1040 * @tc.require: AR000GHSJK
1041 */
1042 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_003, testing::ext::TestSize.Level1)
1043 {
1044 const std::string pkgName = "pkgNametest";
1045 DeletePermission();
1046 int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1047 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1048 }
1049
1050 /**
1051 * @tc.name: UnRegisterCredentialCallback_001
1052 * @tc.desc:The return value is DM_OK
1053 * @tc.type: FUNC
1054 * @tc.require: AR000GHSJK
1055 */
1056 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_001, testing::ext::TestSize.Level1)
1057 {
1058 const std::string pkgName = "pkgNametest";
1059 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1060 int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1061 EXPECT_EQ(ret, DM_OK);
1062 }
1063
1064 /**
1065 * @tc.name: UnRegisterCredentialCallback_002
1066 * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
1067 * @tc.type: FUNC
1068 * @tc.require: AR000GHSJK
1069 */
1070 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_002, testing::ext::TestSize.Level1)
1071 {
1072 const std::string pkgName = "";
1073 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1074 int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1075 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1076 }
1077
1078 /**
1079 * @tc.name: UnRegisterCredentialCallback_003
1080 * @tc.desc:The return value is ERR_DM_NO_PERMISSION
1081 * @tc.type: FUNC
1082 * @tc.require: AR000GHSJK
1083 */
1084 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_003, testing::ext::TestSize.Level1)
1085 {
1086 const std::string pkgName = "pkgNametest";
1087 DeletePermission();
1088 int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1089 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1090 }
1091
1092 /**
1093 * @tc.name: UninitSoftbusListener_001
1094 * @tc.desc: DeviceManagerService::GetInstance().softbusListener_ is nullptr
1095 * @tc.type: FUNC
1096 * @tc.require: AR000GHSJK
1097 */
1098 HWTEST_F(DeviceManagerServiceTest, UninitSoftbusListener_001, testing::ext::TestSize.Level1)
1099 {
1100 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1101 DeviceManagerService::GetInstance().UninitSoftbusListener();
1102 EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1103 }
1104
1105 /**
1106 * @tc.name: UninitDMServiceListener_001
1107 * @tc.desc: DeviceManagerService::GetInstance().listener_ is nullptr
1108 * @tc.type: FUNC
1109 * @tc.require: AR000GHSJK
1110 */
1111 HWTEST_F(DeviceManagerServiceTest, UninitDMServiceListener_001, testing::ext::TestSize.Level1)
1112 {
1113 DeviceManagerService::GetInstance().listener_ = std::make_shared<DeviceManagerServiceListener>();
1114 DeviceManagerService::GetInstance().UninitDMServiceListener();
1115 EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1116 }
1117
1118 /**
1119 * @tc.name: IsDMServiceImplReady_001
1120 * @tc.desc: The return value is true
1121 * @tc.type: FUNC
1122 * @tc.require: AR000GHSJK
1123 */
1124 HWTEST_F(DeviceManagerServiceTest, IsDMServiceImplReady_001, testing::ext::TestSize.Level1)
1125 {
1126 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1127 bool ret = DeviceManagerService::GetInstance().IsDMServiceImplReady();
1128 EXPECT_EQ(ret, true);
1129 }
1130
1131 /**
1132 * @tc.name: GetDeviceInfo_001
1133 * @tc.desc: The return value is ERR_DM_INPUT_PARA_INVALID
1134 * @tc.type: FUNC
1135 * @tc.require: AR000GHSJK
1136 */
1137 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_001, testing::ext::TestSize.Level1)
1138 {
1139 std::string networkId = "";
1140 DmDeviceInfo info;
1141 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1142 int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1143 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1144 }
1145
1146 /**
1147 * @tc.name: GetDeviceInfo_002
1148 * @tc.desc: The return value is DM_OK
1149 * @tc.type: FUNC
1150 * @tc.require: AR000GHSJK
1151 */
1152 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_002, testing::ext::TestSize.Level1)
1153 {
1154 std::string networkId = "networkIdTest";
1155 DmDeviceInfo info;
1156 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1157 int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1158 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1159 }
1160
1161 /**
1162 * @tc.name: GetDeviceInfo_004
1163 * @tc.desc: The return value is DM_OK
1164 * @tc.type: FUNC
1165 * @tc.require: AR000GHSJK
1166 */
1167 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_004, testing::ext::TestSize.Level1)
1168 {
1169 std::string networkId = "networkIdTest4";
1170 DmDeviceInfo info;
1171 DeletePermission();
1172 int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1173 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1174 }
1175
1176 /**
1177 * @tc.name: CheckApiPermission_001
1178 * @tc.desc: The return value is DM_OK
1179 * @tc.type: FUNC
1180 */
1181 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_001, testing::ext::TestSize.Level1)
1182 {
1183 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1184 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(0);
1185 EXPECT_EQ(ret, DM_OK);
1186 }
1187
1188 /**
1189 * @tc.name: RegisterCallerAppId_001
1190 * @tc.desc: Set pkgName null
1191 * @tc.type: FUNC
1192 */
1193 HWTEST_F(DeviceManagerServiceTest, RegisterCallerAppId_001, testing::ext::TestSize.Level1)
1194 {
1195 std::string pkgName;
1196 DeviceManagerService::GetInstance().RegisterCallerAppId(pkgName);
1197 EXPECT_NE(DeviceManagerService::GetInstance().listener_, nullptr);
1198 }
1199
1200 /**
1201 * @tc.name: RegisterCallerAppId_002
1202 * @tc.desc: Set pkgName null
1203 * @tc.type: FUNC
1204 */
1205 HWTEST_F(DeviceManagerServiceTest, RegisterCallerAppId_002, testing::ext::TestSize.Level1)
1206 {
1207 std::string pkgName;
1208 DeviceManagerService::GetInstance().listener_ = nullptr;
1209 DeviceManagerService::GetInstance().RegisterCallerAppId(pkgName);
1210 EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1211 }
1212
1213 /**
1214 * @tc.name: UnRegisterDeviceManagerListener_001
1215 * @tc.desc: Set pkgName null
1216 * @tc.type: FUNC
1217 */
1218 HWTEST_F(DeviceManagerServiceTest, UnRegisterCallerAppId_001, testing::ext::TestSize.Level1)
1219 {
1220 std::string pkgName;
1221 DeviceManagerService::GetInstance().UnRegisterCallerAppId(pkgName);
1222 EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1223 }
1224
1225 /**
1226 * @tc.name: UnRegisterDeviceManagerListener_002
1227 * @tc.desc: Set pkgName null
1228 * @tc.type: FUNC
1229 */
1230 HWTEST_F(DeviceManagerServiceTest, UnRegisterCallerAppId_002, testing::ext::TestSize.Level1)
1231 {
1232 std::string pkgName;
1233 DeviceManagerService::GetInstance().listener_ = nullptr;
1234 DeviceManagerService::GetInstance().UnRegisterCallerAppId(pkgName);
1235 EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1236 }
1237
1238 HWTEST_F(DeviceManagerServiceTest, BindDevice_001, testing::ext::TestSize.Level1)
1239 {
1240 std::string pkgName;
1241 int32_t authType = 1;
1242 std::string deviceId;
1243 std::string bindParam;
1244 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1245 int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1246 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1247 }
1248
1249 HWTEST_F(DeviceManagerServiceTest, BindDevice_002, testing::ext::TestSize.Level1)
1250 {
1251 std::string pkgName = "com.ohos.test";
1252 int32_t authType = 1;
1253 std::string deviceId;
1254 std::string bindParam;
1255 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1256 int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1257 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1258 }
1259
1260 HWTEST_F(DeviceManagerServiceTest, BindDevice_003, testing::ext::TestSize.Level1)
1261 {
1262 std::string pkgName = "com.ohos.test";
1263 int32_t authType = 1;
1264 std::string deviceId = "1234";
1265 std::string bindParam;
1266 EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1267 EXPECT_CALL(*softbusListenerMock_,
1268 GetTargetInfoFromCache(_, _, _)).WillOnce(Return(ERR_DM_BIND_INPUT_PARA_INVALID));
1269 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1270 int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1271 EXPECT_EQ(ret, ERR_DM_BIND_INPUT_PARA_INVALID);
1272 }
1273
1274 HWTEST_F(DeviceManagerServiceTest, BindDevice_004, testing::ext::TestSize.Level1)
1275 {
1276 std::string pkgName = "com.ohos.test";
1277 int32_t authType = 1;
1278 std::string deviceId = "1234";
1279 std::string bindParam;
1280 DeletePermission();
1281 int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1282 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1283 }
1284
1285 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_001, testing::ext::TestSize.Level1)
1286 {
1287 std::string pkgName = "com.ohos.test";
1288 std::string deviceId = "1234";
1289 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1290 EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1291 EXPECT_CALL(*softbusListenerMock_, GetUdidFromDp(_, _)).WillOnce(Return(ERR_DM_FAILED));
1292 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1293 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1294 EXPECT_NE(ret, DM_OK);
1295 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1296 }
1297
1298 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_002, testing::ext::TestSize.Level1)
1299 {
1300 std::string pkgName = "com.ohos.test";
1301 std::string deviceId;
1302 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1303 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1304 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1305 }
1306
1307 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_003, testing::ext::TestSize.Level1)
1308 {
1309 std::string pkgName;
1310 std::string deviceId = "1234";
1311 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1312 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1313 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1314 }
1315
1316 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_004, testing::ext::TestSize.Level1)
1317 {
1318 std::string pkgName = "com.ohos.test";
1319 std::string deviceId = "1234";
1320 DeletePermission();
1321 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1322 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1323 }
1324
1325 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_005, testing::ext::TestSize.Level1)
1326 {
1327 std::string pkgName = "com.ohos.test";
1328 std::string deviceId = "1234";
1329 std::string extra = "extra";
1330 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1331 EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1332 EXPECT_CALL(*softbusListenerMock_, GetUdidFromDp(_, _)).WillOnce(Return(ERR_DM_FAILED));
1333 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1334 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1335 EXPECT_EQ(ret, ERR_DM_FAILED);
1336 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1337 }
1338
1339 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_006, testing::ext::TestSize.Level1)
1340 {
1341 std::string pkgName = "com.ohos.test";
1342 std::string deviceId;
1343 std::string extra = "extra";
1344 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1345 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1346 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1347 }
1348
1349 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_007, testing::ext::TestSize.Level1)
1350 {
1351 std::string pkgName;
1352 std::string deviceId = "1234";
1353 std::string extra = "extra";
1354 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1355 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1356 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1357 }
1358
1359 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_008, testing::ext::TestSize.Level1)
1360 {
1361 std::string pkgName = "com.ohos.test";
1362 std::string deviceId = "1234";
1363 std::string extra = "extra";
1364 DeletePermission();
1365 int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1366 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1367 }
1368
1369 HWTEST_F(DeviceManagerServiceTest, OnSessionOpened_001, testing::ext::TestSize.Level1)
1370 {
1371 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1372 int sessionId = 0;
1373 int result = 0;
1374 void *data = nullptr;
1375 unsigned int dataLen = 0;
1376 int ret = DeviceManagerService::GetInstance().OnSessionOpened(sessionId, result);
1377 DeviceManagerService::GetInstance().OnBytesReceived(sessionId, data, dataLen);
1378 DeviceManagerService::GetInstance().OnSessionClosed(sessionId);
1379 EXPECT_NE(ret, ERR_DM_NOT_INIT);
1380 }
1381
1382 HWTEST_F(DeviceManagerServiceTest, MineRequestCredential_001, testing::ext::TestSize.Level1)
1383 {
1384 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1385 std::string pkgName;
1386 std::string returnJsonStr;
1387 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1388 int32_t ret = DeviceManagerService::GetInstance().MineRequestCredential(pkgName, returnJsonStr);
1389 EXPECT_EQ(ret, DM_OK);
1390 }
1391
1392 HWTEST_F(DeviceManagerServiceTest, MineRequestCredential_002, testing::ext::TestSize.Level1)
1393 {
1394 std::string pkgName;
1395 std::string returnJsonStr;
1396 DeletePermission();
1397 int32_t ret = DeviceManagerService::GetInstance().MineRequestCredential(pkgName, returnJsonStr);
1398 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1399 }
1400
1401 HWTEST_F(DeviceManagerServiceTest, CheckCredential_001, testing::ext::TestSize.Level1)
1402 {
1403 std::string pkgName;
1404 std::string returnJsonStr;
1405 std::string reqJsonStr;
1406 int32_t ret = DeviceManagerService::GetInstance().CheckCredential(pkgName, reqJsonStr, returnJsonStr);
1407 EXPECT_NE(ret, DM_OK);
1408 }
1409
1410 HWTEST_F(DeviceManagerServiceTest, CheckCredential_002, testing::ext::TestSize.Level1)
1411 {
1412 DeletePermission();
1413 std::string pkgName;
1414 std::string returnJsonStr;
1415 std::string reqJsonStr;
1416 int32_t ret = DeviceManagerService::GetInstance().CheckCredential(pkgName, reqJsonStr, returnJsonStr);
1417 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1418 }
1419
1420 HWTEST_F(DeviceManagerServiceTest, ImportCredential_004, testing::ext::TestSize.Level1)
1421 {
1422 DeletePermission();
1423 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1424 std::string pkgName;
1425 std::string returnJsonStr;
1426 std::string reqJsonStr;
1427 int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, reqJsonStr, returnJsonStr);
1428 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1429 }
1430
1431 HWTEST_F(DeviceManagerServiceTest, ImportCredential_005, testing::ext::TestSize.Level1)
1432 {
1433 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1434 std::string pkgName;
1435 std::string returnJsonStr;
1436 std::string reqJsonStr;
1437 int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, reqJsonStr, returnJsonStr);
1438 EXPECT_NE(ret, DM_OK);
1439 }
1440
1441 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_004, testing::ext::TestSize.Level1)
1442 {
1443 DeletePermission();
1444 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1445 std::string pkgName;
1446 std::string returnJsonStr;
1447 std::string reqJsonStr;
1448 int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, reqJsonStr, returnJsonStr);
1449 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1450 }
1451
1452 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_005, testing::ext::TestSize.Level1)
1453 {
1454 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1455 std::string pkgName;
1456 std::string returnJsonStr;
1457 std::string reqJsonStr;
1458 int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, reqJsonStr, returnJsonStr);
1459 EXPECT_NE(ret, DM_OK);
1460 }
1461
1462 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_001, testing::ext::TestSize.Level1)
1463 {
1464 std::string pkgName;
1465 int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1466 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1467 }
1468
1469 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_002, testing::ext::TestSize.Level1)
1470 {
1471 std::string pkgName = "pkgName";
1472 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1473 int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1474 EXPECT_EQ(ret, DM_OK);
1475 }
1476
1477 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_003, testing::ext::TestSize.Level1)
1478 {
1479 std::string pkgName = "pkgName";
1480 DeletePermission();
1481 int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1482 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1483 }
1484
1485 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_001, testing::ext::TestSize.Level1)
1486 {
1487 std::string pkgName;
1488 int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1489 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1490 }
1491
1492 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_002, testing::ext::TestSize.Level1)
1493 {
1494 std::string pkgName = "pkgName";
1495 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1496 int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1497 EXPECT_EQ(ret, DM_OK);
1498 }
1499
1500 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_003, testing::ext::TestSize.Level1)
1501 {
1502 std::string pkgName = "pkgName";
1503 DeletePermission();
1504 int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1505 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1506 }
1507
1508 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_001, testing::ext::TestSize.Level1)
1509 {
1510 std::string pkgName;
1511 int32_t eventId = 0;
1512 std::string event;
1513 std::string msg = "";
1514 DeviceManagerService::GetInstance().HandleDeviceNotTrust(msg);
1515 msg = R"(
1516 {
1517 "authType" : 1,
1518 "userId" : "123",
1519 "credentialData" : "cryptosupportData",
1520 "CRYPTOSUPPORT" : "cryptosupportTest",
1521 "credentialType" : 1,
1522 "credentialId" : "104",
1523 "NETWORK_ID" : "108",
1524 "authCode" : "1234567812345678123456781234567812345678123456781234567812345678",
1525 "serverPk" : "hello",
1526 "pkInfoSignature" : "world",
1527 "pkInfo" : "pkginfo",
1528 "peerDeviceId" : "3515656546"
1529 })";
1530 EXPECT_CALL(*softbusCacheMock_, GetUdidFromCache(_, _)).WillOnce(Return(DM_OK));
1531 DeviceManagerService::GetInstance().HandleDeviceNotTrust(msg);
1532 std::string commonEventType = "helloworld";
1533 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1534 DeviceManagerService::GetInstance().ScreenCommonEventCallback(commonEventType);
1535 int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1536 EXPECT_NE(ret, DM_OK);
1537 }
1538
1539 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_002, testing::ext::TestSize.Level1)
1540 {
1541 DeletePermission();
1542 std::string pkgName;
1543 int32_t eventId = 0;
1544 std::string event;
1545 int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1546 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1547 }
1548
1549 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_003, testing::ext::TestSize.Level1)
1550 {
1551 std::string pkgName;
1552 int32_t eventId = DM_NOTIFY_EVENT_ON_PINHOLDER_EVENT;
1553 std::string event;
1554 DeviceManagerService::GetInstance().InitDMServiceListener();
1555 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1556 int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1557 EXPECT_EQ(ret, ERR_DM_FAILED);
1558 DeviceManagerService::GetInstance().UninitDMServiceListener();
1559 }
1560
1561 HWTEST_F(DeviceManagerServiceTest, LoadHardwareFwkService_001, testing::ext::TestSize.Level1)
1562 {
1563 DeviceManagerService::GetInstance().LoadHardwareFwkService();
1564 EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1565 }
1566
1567 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_001, testing::ext::TestSize.Level1)
1568 {
1569 std::string pkgName;
1570 std::string networkId;
1571 std::string uuid;
1572 int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1573 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1574 }
1575
1576 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_002, testing::ext::TestSize.Level1)
1577 {
1578 std::string pkgName = "pkgName";
1579 std::string networkId;
1580 std::string uuid;
1581 int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1582 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1583 }
1584
1585 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_003, testing::ext::TestSize.Level1)
1586 {
1587 std::string pkgName = "pkgName";
1588 std::string networkId = "network_id";
1589 std::string uuid = "13345689";
1590 if (DeviceManagerService::GetInstance().softbusListener_ == nullptr) {
1591 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1592 }
1593 EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(ERR_DM_FAILED));
1594 int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1595 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1596 EXPECT_EQ(ret, ERR_DM_FAILED);
1597 }
1598
1599 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_002, testing::ext::TestSize.Level1)
1600 {
1601 DeletePermission();
1602 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(0);
1603 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1604 }
1605
1606 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_003, testing::ext::TestSize.Level1)
1607 {
1608 DeletePermission();
1609 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(1);
1610 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1611 }
1612
1613 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_004, testing::ext::TestSize.Level1)
1614 {
1615 DeletePermission();
1616 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(2);
1617 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1618 }
1619
1620 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_005, testing::ext::TestSize.Level1)
1621 {
1622 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1623 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(1);
1624 EXPECT_EQ(ret, DM_OK);
1625 }
1626
1627 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_006, testing::ext::TestSize.Level1)
1628 {
1629 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(2);
1630 EXPECT_NE(ret, ERR_DM_FAILED);
1631 }
1632
1633 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_007, testing::ext::TestSize.Level1)
1634 {
1635 int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(3);
1636 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1637 }
1638
1639 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_001, testing::ext::TestSize.Level1)
1640 {
1641 DeletePermission();
1642 std::string pkgName;
1643 std::string netWorkId;
1644 int32_t networkType = 0;
1645 int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1646 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1647 }
1648
1649 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_002, testing::ext::TestSize.Level1)
1650 {
1651 std::string pkgName;
1652 std::string netWorkId;
1653 int32_t networkType = 0;
1654 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1655 int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1656 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1657 }
1658
1659 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_003, testing::ext::TestSize.Level1)
1660 {
1661 std::string pkgName = "pkgName";
1662 std::string netWorkId = "netWorkId";
1663 int32_t networkType = 0;
1664 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1665 int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1666 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1667 }
1668
1669 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_004, testing::ext::TestSize.Level1)
1670 {
1671 std::string pkgName = "pkgName";
1672 std::string netWorkId = "netWorkId";
1673 int32_t networkType = 0;
1674 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1675 EXPECT_CALL(*softbusListenerMock_, GetNetworkTypeByNetworkId(_, _))
1676 .WillOnce(Return(ERR_DM_FAILED));
1677 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1678 int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1679 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1680 EXPECT_EQ(ret, ERR_DM_FAILED);
1681 }
1682
1683 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_001, testing::ext::TestSize.Level1)
1684 {
1685 DeletePermission();
1686 std::string pkgName;
1687 std::string authCode;
1688 int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
1689 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1690 }
1691
1692 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_002, testing::ext::TestSize.Level1)
1693 {
1694 std::string pkgName = "pkgName";
1695 std::string authCode = "authCode";
1696 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
1697 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1698 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(false));
1699 int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
1700 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1701 }
1702
1703 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_001, testing::ext::TestSize.Level1)
1704 {
1705 DeletePermission();
1706 std::string authCode;
1707 int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
1708 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1709 }
1710
1711 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_002, testing::ext::TestSize.Level1)
1712 {
1713 std::string authCode = "authCode";
1714 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
1715 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1716 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(false));
1717 int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
1718 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1719 }
1720
1721 HWTEST_F(DeviceManagerServiceTest, UnloadDMServiceImplSo_001, testing::ext::TestSize.Level1)
1722 {
1723 DeviceManagerService::GetInstance().UnloadDMServiceImplSo();
1724 EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1725 }
1726
1727 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_001, testing::ext::TestSize.Level1)
1728 {
1729 DeletePermission();
1730 std::string pkgName;
1731 std::map<std::string, std::string> discoverParam;
1732 std::map<std::string, std::string> filterOptions;
1733 int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1734 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1735 }
1736
1737 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_002, testing::ext::TestSize.Level1)
1738 {
1739 std::string pkgName;
1740 std::map<std::string, std::string> discoverParam;
1741 std::map<std::string, std::string> filterOptions;
1742 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1743 int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1744 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1745 }
1746
1747 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_003, testing::ext::TestSize.Level1)
1748 {
1749 std::string pkgName = "pkgName";
1750 std::map<std::string, std::string> discoverParam;
1751 std::map<std::string, std::string> filterOptions;
1752 DeviceManagerService::GetInstance().InitDMServiceListener();
1753 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillRepeatedly(Return(true));
1754 int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1755 EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == DM_OK || ret == SOFTBUS_DISCOVER_MANAGER_INNERFUNCTION_FAIL);
1756 ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1757 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1758 DeviceManagerService::GetInstance().UninitDMServiceListener();
1759 }
1760
1761 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_004, testing::ext::TestSize.Level1)
1762 {
1763 std::string pkgName = "pkgName";
1764 std::map<std::string, std::string> discoverParam;
1765 discoverParam[PARAM_KEY_META_TYPE] = "metaType";
1766 discoverParam[PARAM_KEY_SUBSCRIBE_ID] = "123456";
1767 discoverParam[PARAM_KEY_DISC_MEDIUM] =
1768 std::to_string(static_cast<int32_t>(DmExchangeMedium::DM_AUTO));
1769 discoverParam[PARAM_KEY_DISC_FREQ] =
1770 std::to_string(static_cast<int32_t>(DmExchangeFreq::DM_LOW));
1771 std::map<std::string, std::string> filterOptions;
1772 DeviceManagerService::GetInstance().InitDMServiceListener();
1773 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillRepeatedly(Return(true));
1774 int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1775 EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == DM_OK || ret == SOFTBUS_DISCOVER_MANAGER_INNERFUNCTION_FAIL);
1776 DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1777 DeviceManagerService::GetInstance().UninitDMServiceListener();
1778 }
1779
1780 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_001, testing::ext::TestSize.Level1)
1781 {
1782 DeletePermission();
1783 std::string pkgName;
1784 std::map<std::string, std::string> discoverParam;
1785 int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1786 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1787 }
1788
1789 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_002, testing::ext::TestSize.Level1)
1790 {
1791 std::string pkgName;
1792 std::map<std::string, std::string> discoverParam;
1793 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1794 int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1795 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1796 }
1797
1798 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_003, testing::ext::TestSize.Level1)
1799 {
1800 std::string pkgName = "pkgName";
1801 std::map<std::string, std::string> discoverParam;
1802 DeviceManagerService::GetInstance().InitDMServiceListener();
1803 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1804 int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1805 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1806 DeviceManagerService::GetInstance().UninitDMServiceListener();
1807 }
1808
1809 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_001, testing::ext::TestSize.Level1)
1810 {
1811 DeletePermission();
1812 std::string pkgName;
1813 std::map<std::string, std::string> discoverParam;
1814 std::map<std::string, std::string> filterOptions;
1815 int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1816 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1817 }
1818
1819 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_002, testing::ext::TestSize.Level1)
1820 {
1821 std::string pkgName;
1822 std::map<std::string, std::string> discoverParam;
1823 std::map<std::string, std::string> filterOptions;
1824 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1825 int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1826 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1827 }
1828
1829 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_003, testing::ext::TestSize.Level1)
1830 {
1831 std::string pkgName = "pkgName";
1832 std::map<std::string, std::string> discoverParam;
1833 std::map<std::string, std::string> filterOptions;
1834 int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1835 EXPECT_NE(ret, DM_OK);
1836 }
1837
1838 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_004, testing::ext::TestSize.Level1)
1839 {
1840 std::string pkgName = "pkgName";
1841 std::map<std::string, std::string> discoverParam;
1842 std::map<std::string, std::string> filterOptions;
1843 DeviceManagerService::GetInstance().InitDMServiceListener();
1844 int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1845 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1846 DeviceManagerService::GetInstance().UninitDMServiceListener();
1847 }
1848
1849 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_001, testing::ext::TestSize.Level1)
1850 {
1851 DeletePermission();
1852 std::string pkgName;
1853 std::map<std::string, std::string> extraParam;
1854 int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1855 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1856 }
1857
1858 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_002, testing::ext::TestSize.Level1)
1859 {
1860 std::string pkgName;
1861 std::map<std::string, std::string> extraParam;
1862 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1863 int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1864 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1865 }
1866
1867 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_003, testing::ext::TestSize.Level1)
1868 {
1869 std::string pkgName = "pkgName";
1870 std::map<std::string, std::string> extraParam;
1871 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1872 int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1873 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1874 }
1875
1876 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_004, testing::ext::TestSize.Level1)
1877 {
1878 std::string pkgName = "pkgName";
1879 std::map<std::string, std::string> extraParam;
1880 DeviceManagerService::GetInstance().InitDMServiceListener();
1881 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1882 int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1883 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1884 DeviceManagerService::GetInstance().UninitDMServiceListener();
1885 }
1886
1887 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_001, testing::ext::TestSize.Level1)
1888 {
1889 DeletePermission();
1890 std::string pkgName;
1891 std::map<std::string, std::string> advertiseParam;
1892 int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1893 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1894 }
1895
1896 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_002, testing::ext::TestSize.Level1)
1897 {
1898 std::string pkgName;
1899 std::map<std::string, std::string> advertiseParam;
1900 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1901 int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1902 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1903 }
1904
1905 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_003, testing::ext::TestSize.Level1)
1906 {
1907 std::string pkgName = "com.ohos.test";
1908 std::map<std::string, std::string> advertiseParam;
1909 advertiseParam[PARAM_KEY_META_TYPE] = "metaType";
1910 advertiseParam[PARAM_KEY_PUBLISH_ID] = "123456";
1911 advertiseParam[PARAM_KEY_DISC_MODE] =
1912 std::to_string(static_cast<int32_t>(DmDiscoverMode::DM_DISCOVER_MODE_PASSIVE));
1913 DeviceManagerService::GetInstance().InitDMServiceListener();
1914 int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1915 EXPECT_NE(ret, ERR_DM_FAILED);
1916 DeviceManagerService::GetInstance().UninitDMServiceListener();
1917 }
1918
1919 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_001, testing::ext::TestSize.Level1)
1920 {
1921 DeletePermission();
1922 std::string pkgName;
1923 std::map<std::string, std::string> advertiseParam;
1924 int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1925 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1926 }
1927
1928 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_002, testing::ext::TestSize.Level1)
1929 {
1930 std::string pkgName;
1931 std::map<std::string, std::string> advertiseParam;
1932 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1933 int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1934 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1935 }
1936
1937 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_003, testing::ext::TestSize.Level1)
1938 {
1939 std::string pkgName = "pkgName";
1940 std::map<std::string, std::string> advertiseParam;
1941 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1942 int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1943 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1944 }
1945
1946 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_004, testing::ext::TestSize.Level1)
1947 {
1948 std::string pkgName = "StopAdvertising_004";
1949 std::map<std::string, std::string> advertiseParam;
1950 DeviceManagerService::GetInstance().InitDMServiceListener();
1951 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1952 int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1953 EXPECT_TRUE(ret == SOFTBUS_DISCOVER_COAP_STOP_PUBLISH_FAIL || ret == SOFTBUS_ERR ||
1954 ret == ERR_DM_INPUT_PARA_INVALID);
1955 DeviceManagerService::GetInstance().UninitDMServiceListener();
1956 }
1957
1958 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_005, testing::ext::TestSize.Level1)
1959 {
1960 std::string pkgName = "StopAdvertising_005";
1961 std::map<std::string, std::string> advertiseParam;
1962 std::string key = PARAM_KEY_META_TYPE;
1963 std::string value = "125";
1964 advertiseParam.insert(std::make_pair(key, value));
1965 key = PARAM_KEY_PUBLISH_ID;
1966 value = "128";
1967 advertiseParam.insert(std::make_pair(key, value));
1968 DeviceManagerService::GetInstance().InitDMServiceListener();
1969 int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1970 EXPECT_NE(ret, DM_OK);
1971 DeviceManagerService::GetInstance().UninitDMServiceListener();
1972 }
1973
1974 HWTEST_F(DeviceManagerServiceTest, BindTarget_004, testing::ext::TestSize.Level1)
1975 {
1976 DeletePermission();
1977 std::string pkgName;
1978 PeerTargetId targetId;
1979 std::map<std::string, std::string> bindParam;
1980 int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
1981 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1982 }
1983
1984 HWTEST_F(DeviceManagerServiceTest, BindTarget_005, testing::ext::TestSize.Level1)
1985 {
1986 std::string pkgName;
1987 PeerTargetId targetId;
1988 std::map<std::string, std::string> bindParam;
1989 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1990 int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
1991 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1992 }
1993
1994 HWTEST_F(DeviceManagerServiceTest, BindTarget_006, testing::ext::TestSize.Level1)
1995 {
1996 std::string pkgName = "pkgName";
1997 PeerTargetId targetId;
1998 std::map<std::string, std::string> bindParam;
1999 targetId.wifiIp = "";
2000 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2001 DeviceManagerService::GetInstance().dmServiceImpl_ = nullptr;
2002 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2003 int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
2004 EXPECT_EQ(ret, DM_OK);
2005 }
2006
2007 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_004, testing::ext::TestSize.Level1)
2008 {
2009 DeletePermission();
2010 std::string pkgName;
2011 PeerTargetId targetId;
2012 std::map<std::string, std::string> unbindParam;
2013 int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2014 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2015 }
2016
2017 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_005, testing::ext::TestSize.Level1)
2018 {
2019 std::string pkgName;
2020 PeerTargetId targetId;
2021 std::map<std::string, std::string> unbindParam;
2022 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2023 int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2024 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2025 }
2026
2027 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_006, testing::ext::TestSize.Level1)
2028 {
2029 std::string pkgName = "pkgName";
2030 PeerTargetId targetId;
2031 std::map<std::string, std::string> unbindParam;
2032 int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2033 EXPECT_NE(ret, DM_OK);
2034 }
2035
2036 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_001, testing::ext::TestSize.Level1)
2037 {
2038 DeletePermission();
2039 std::string pkgName;
2040 int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2041 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2042 }
2043
2044 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_002, testing::ext::TestSize.Level1)
2045 {
2046 std::string pkgName = "pkgName";
2047 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2048 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2049 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2050 int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2051 EXPECT_NE(ret, DM_OK);
2052 }
2053
2054 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_001, testing::ext::TestSize.Level1)
2055 {
2056 DeletePermission();
2057 std::string pkgName;
2058 PeerTargetId targetId;
2059 DmPinType pinType = DmPinType::QR_CODE;
2060 std::string payload;
2061 int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2062 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2063 }
2064
2065 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_002, testing::ext::TestSize.Level1)
2066 {
2067 std::string pkgName = "pkgName";
2068 PeerTargetId targetId;
2069 DmPinType pinType = DmPinType::QR_CODE;
2070 std::string payload;
2071 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2072 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2073 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2074 int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2075 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2076 }
2077
2078 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_001, testing::ext::TestSize.Level1)
2079 {
2080 DeletePermission();
2081 std::string pkgName;
2082 PeerTargetId targetId;
2083 DmPinType pinType = DmPinType::QR_CODE;
2084 std::string payload;
2085 int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2086 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2087 }
2088
2089 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_002, testing::ext::TestSize.Level1)
2090 {
2091 std::string pkgName = "pkgName";
2092 PeerTargetId targetId;
2093 DmPinType pinType = DmPinType::QR_CODE;
2094 std::string payload;
2095 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2096 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2097 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2098 int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2099 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2100 }
2101
2102
2103 HWTEST_F(DeviceManagerServiceTest, DpAclAdd_001, testing::ext::TestSize.Level1)
2104 {
2105 DeletePermission();
2106 std::string udid;
2107 int32_t ret = DeviceManagerService::GetInstance().DpAclAdd(udid);
2108 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2109 }
2110
2111 HWTEST_F(DeviceManagerServiceTest, DpAclAdd_002, testing::ext::TestSize.Level1)
2112 {
2113 std::string udid = "udid";
2114 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2115 int32_t ret = DeviceManagerService::GetInstance().DpAclAdd(udid);
2116 EXPECT_EQ(ret, DM_OK);
2117 }
2118
2119 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_001, testing::ext::TestSize.Level1)
2120 {
2121 std::string pkgName;
2122 std::string networkId;
2123 int32_t securityLevel = -1;
2124 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2125 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, networkId, securityLevel);
2126 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2127 }
2128
2129 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_002, testing::ext::TestSize.Level1)
2130 {
2131 std::string pkgName = "com.ohos.test";
2132 std::string invalidNetworkId = "12345";
2133 int32_t securityLevel = -1;
2134 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2135 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2136 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2137 }
2138
2139 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_003, testing::ext::TestSize.Level1)
2140 {
2141 std::string pkgName = "com.ohos.test";
2142 std::string invalidNetworkId = "12345";
2143 int32_t securityLevel = -1;
2144 DeletePermission();
2145 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2146 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2147 }
2148
2149 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_004, testing::ext::TestSize.Level1)
2150 {
2151 std::string pkgName = "com.ohos.test";
2152 std::string invalidNetworkId;
2153 int32_t securityLevel = -1;
2154 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2155 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2156 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2157 }
2158
2159 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_005, testing::ext::TestSize.Level1)
2160 {
2161 std::string pkgName = "com.ohos.test";
2162 std::string invalidNetworkId;
2163 int32_t securityLevel = 0;
2164 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2165 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2166 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2167 EXPECT_NE(ret, DM_OK);
2168 }
2169
2170 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_001, testing::ext::TestSize.Level1)
2171 {
2172 std::string udid = "";
2173 EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_INPUT_PARA_INVALID));
2174 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2175 int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2176 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2177 }
2178
2179 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_002, testing::ext::TestSize.Level1)
2180 {
2181 std::string udid = "udidTest";
2182 EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_INPUT_PARA_INVALID));
2183 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2184 int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2185 EXPECT_NE(ret, DM_OK);
2186 }
2187
2188 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_003, testing::ext::TestSize.Level1)
2189 {
2190 std::string udid = "udidTest";
2191 DeletePermission();
2192 int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2193 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2194 }
2195
2196 HWTEST_F(DeviceManagerServiceTest, CheckIsSameAccount_001, testing::ext::TestSize.Level1)
2197 {
2198 DmAccessCaller caller;
2199 DmAccessCallee callee;
2200 DeletePermission();
2201 bool ret = DeviceManagerService::GetInstance().CheckIsSameAccount(caller, callee);
2202 EXPECT_FALSE(ret);
2203 }
2204
2205
2206 HWTEST_F(DeviceManagerServiceTest, CheckAccessControl_001, testing::ext::TestSize.Level1)
2207 {
2208 DmAccessCaller caller;
2209 DmAccessCallee callee;
2210 DeletePermission();
2211 bool ret = DeviceManagerService::GetInstance().CheckAccessControl(caller, callee);
2212 EXPECT_FALSE(ret);
2213 }
2214
2215 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_001, testing::ext::TestSize.Level1)
2216 {
2217 std::string pkgName;
2218 std::map<std::string, std::string> policy;
2219 std::string processName = "collaboration_service";
2220 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_))
2221 .WillOnce(DoAll(SetArgReferee<0>(processName), Return(DM_OK)));
2222 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnSetDnPolicy(_)).WillOnce(Return(true));
2223 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2224 int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2225 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2226 }
2227
2228 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_002, testing::ext::TestSize.Level1)
2229 {
2230 std::string pkgName = "openharmony123";
2231 std::map<std::string, std::string> policy;
2232 DeletePermission();
2233 int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2234 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2235 }
2236
2237 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_003, testing::ext::TestSize.Level1)
2238 {
2239 std::string pkgName = "openharmony123";
2240 std::map<std::string, std::string> policy;
2241 std::vector<std::string> peerUdids;
2242 int32_t userId = 1;
2243 uint64_t tokenId = 87;
2244 DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, USER);
2245 DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, APP);
2246 DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, 2);
2247 DeviceManagerService::GetInstance().SendDeviceUnBindBroadCast(peerUdids, userId);
2248 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2249 DeviceManagerService::GetInstance().SendDeviceUnBindBroadCast(peerUdids, userId);
2250 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2251 std::string processName = "collaboration_service";
2252 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_))
2253 .WillOnce(DoAll(SetArgReferee<0>(processName), Return(DM_OK)));
2254 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnSetDnPolicy(_)).WillOnce(Return(true));
2255 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2256 int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2257 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2258 }
2259
2260 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_003, testing::ext::TestSize.Level1)
2261 {
2262 std::string pkgName = "";
2263 PeerTargetId targetId;
2264 DmPinType pinType = DmPinType::QR_CODE;
2265 std::string payload;
2266 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2267 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2268 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2269 int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2270 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2271 }
2272
2273 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_001, testing::ext::TestSize.Level1)
2274 {
2275 std::string pkgName;
2276 std::string networkId;
2277 int32_t screenStatus = 1;
2278 DeletePermission();
2279 int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2280 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2281 }
2282
2283 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_002, testing::ext::TestSize.Level1)
2284 {
2285 std::string pkgName;
2286 std::string networkId;
2287 int32_t screenStatus = 1;
2288 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2289 int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2290 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2291 }
2292
2293 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_003, testing::ext::TestSize.Level1)
2294 {
2295 std::string pkgName = "pkgname";
2296 std::string networkId = "networkId_003";
2297 int32_t screenStatus = 1;
2298 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2299 EXPECT_CALL(*softbusListenerMock_, GetDeviceScreenStatus(_, _)).WillOnce(Return(ERR_DM_FAILED));
2300 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2301 int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2302 EXPECT_EQ(ret, ERR_DM_FAILED);
2303 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2304 }
2305
2306 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_004, testing::ext::TestSize.Level1)
2307 {
2308 std::string pkgName = "pkgname";
2309 std::string networkId = "networkId_003";
2310 int32_t screenStatus = 1;
2311 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2312 int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2313 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2314 }
2315
2316 HWTEST_F(DeviceManagerServiceTest, HandleDeviceScreenStatusChange_001, testing::ext::TestSize.Level1)
2317 {
2318 DmDeviceInfo deviceInfo;
2319 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2320 DeviceManagerService::GetInstance().IsDMServiceImplReady();
2321 EXPECT_CALL(*softbusCacheMock_, GetUdidFromCache(_, _)).WillOnce(Return(DM_OK));
2322 DeviceManagerService::GetInstance().HandleDeviceScreenStatusChange(deviceInfo);
2323 EXPECT_NE(DeviceManagerService::GetInstance().dmServiceImpl_, nullptr);
2324 }
2325
2326 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_005, testing::ext::TestSize.Level1)
2327 {
2328 std::string pkgName = "pkgName";
2329 std::map<std::string, std::string> discoverParam;
2330 std::map<std::string, std::string> filterOptions;
2331 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2332 int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
2333 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2334 }
2335
2336 HWTEST_F(DeviceManagerServiceTest, GetLocalDeviceInfo_002, testing::ext::TestSize.Level1)
2337 {
2338 DmDeviceInfo info;
2339 DeletePermission();
2340 std::string msg = "";
2341 DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2342 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2343 bool result = DeviceManagerService::GetInstance().IsDMServiceImplReady();
2344 EXPECT_TRUE(result);
2345 msg = R"(
2346 {
2347 "type" : 0,
2348 "userId" : 123,
2349 "accountId" : "28776",
2350 "tokenId" : 16,
2351 "peerUdid" : "104",
2352 "accountName" : "account_xiao"
2353 })";
2354 DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2355 msg = R"(
2356 {
2357 "type" : 1,
2358 "userId" : 128,
2359 "accountId" : "28778",
2360 "tokenId" : 17,
2361 "peerUdid" : "108",
2362 "accountName" : "account_li"
2363 })";
2364 DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2365 msg = R"(
2366 {
2367 "type" : 2,
2368 "userId" : 124,
2369 "accountId" : "28779",
2370 "tokenId" : 18,
2371 "peerUdid" : "110",
2372 "accountName" : "account_wang"
2373 })";
2374 int32_t ret = DeviceManagerService::GetInstance().GetLocalDeviceInfo(info);
2375 EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2376 }
2377
2378 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_001, testing::ext::TestSize.Level1)
2379 {
2380 std::string pkgName;
2381 std::string udid;
2382 std::string networkId = "networkIdTest_001";
2383 DeletePermission();
2384 int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2385 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2386 }
2387
2388 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_002, testing::ext::TestSize.Level1)
2389 {
2390 std::string pkgName;
2391 std::string udid;
2392 std::string networkId = "networkIdTest_002";
2393 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2394 int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2395 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2396 }
2397
2398 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_003, testing::ext::TestSize.Level1)
2399 {
2400 std::string pkgName = "pkgName_003";
2401 std::string udid = "sewdwed98897";
2402 std::string networkId = "networkIdTest_003";
2403 EXPECT_CALL(*softbusCacheMock_, GetNetworkIdFromCache(_, _))
2404 .WillOnce(Return(ERR_DM_FAILED));
2405 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2406 int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2407 EXPECT_EQ(ret, ERR_DM_FAILED);
2408 }
2409
2410 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_001, testing::ext::TestSize.Level1)
2411 {
2412 std::string pkgName;
2413 DeletePermission();
2414 int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2415 EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2416 }
2417
2418 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_002, testing::ext::TestSize.Level1)
2419 {
2420 std::string pkgName;
2421 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2422 int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2423 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2424 }
2425
2426 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_003, testing::ext::TestSize.Level1)
2427 {
2428 std::string pkgName = "pkgName_003";
2429 DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2430 DeviceManagerService::GetInstance().IsDMServiceImplReady();
2431 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2432 EXPECT_CALL(*deviceManagerServiceImplMock_, StopAuthenticateDevice(_)).WillOnce(Return(DM_OK));
2433 int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2434 EXPECT_EQ(ret, DM_OK);
2435 }
2436
2437 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_004, testing::ext::TestSize.Level1)
2438 {
2439 std::string pkgName = "";
2440 PeerTargetId targetId;
2441 DmPinType pinType = DmPinType::QR_CODE;
2442 std::string payload;
2443 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2444 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2445 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2446 int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2447 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2448 }
2449
2450 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_005, testing::ext::TestSize.Level1)
2451 {
2452 std::string pkgName = "pkgName_005";
2453 PeerTargetId targetId;
2454 DmPinType pinType = DmPinType::QR_CODE;
2455 std::string payload;
2456 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2457 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2458 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2459 if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2460 DeviceManagerService::GetInstance().InitDMServiceListener();
2461 }
2462 int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2463 EXPECT_EQ(ret, ERR_DM_FAILED);
2464 }
2465
2466 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_003, testing::ext::TestSize.Level1)
2467 {
2468 std::string pkgName = "";
2469 PeerTargetId targetId;
2470 DmPinType pinType = DmPinType::QR_CODE;
2471 std::string payload;
2472 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2473 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2474 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2475 int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2476 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2477 }
2478
2479 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_004, testing::ext::TestSize.Level1)
2480 {
2481 std::string pkgName = "pkgName";
2482 PeerTargetId targetId;
2483 DmPinType pinType = DmPinType::QR_CODE;
2484 std::string payload;
2485 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2486 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2487 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2488 if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2489 DeviceManagerService::GetInstance().InitDMServiceListener();
2490 }
2491 int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2492 EXPECT_EQ(ret, ERR_DM_FAILED);
2493 }
2494
2495 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_003, testing::ext::TestSize.Level1)
2496 {
2497 std::string pkgName;
2498 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2499 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2500 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2501 int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2502 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2503 }
2504
2505 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_004, testing::ext::TestSize.Level1)
2506 {
2507 std::string pkgName = "pkgName";
2508 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2509 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2510 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2511 if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2512 DeviceManagerService::GetInstance().InitDMServiceListener();
2513 }
2514 int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2515 EXPECT_EQ(ret, DM_OK);
2516 }
2517
2518 /**
2519 * @tc.name: ShiftLNNGear_008
2520 * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
2521 * @tc.type: FUNC
2522 * @tc.require: AR000GHSJK
2523 */
2524 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_008, testing::ext::TestSize.Level1)
2525 {
2526 std::string pkgName = "ShiftLNNGear_008";
2527 std::string callerId = "ShiftLNNGear_008";
2528 bool isRefresh = true;
2529 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2530 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2531 EXPECT_CALL(*softbusListenerMock_, ShiftLNNGear(_, _)).WillOnce(Return(ERR_DM_FAILED));
2532 int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
2533 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2534 EXPECT_EQ(ret, ERR_DM_FAILED);
2535 }
2536
2537 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_003, testing::ext::TestSize.Level1)
2538 {
2539 std::string pkgName = "pkgName";
2540 std::string authCode;
2541 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2542 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2543 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2544 int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
2545 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2546 }
2547
2548 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_004, testing::ext::TestSize.Level1)
2549 {
2550 std::string pkgName = "pkgName";
2551 std::string authCode = "authCode";
2552 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2553 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2554 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2555 int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
2556 EXPECT_EQ(ret, DM_OK);
2557 }
2558
2559 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_003, testing::ext::TestSize.Level1)
2560 {
2561 std::string authCode = "authCode";
2562 EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2563 EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2564 EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2565 int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
2566 EXPECT_EQ(ret, DM_OK);
2567 }
2568
2569 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_004, testing::ext::TestSize.Level1)
2570 {
2571 std::string udid = "udidTest";
2572 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2573 EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(DM_OK));
2574 int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2575 EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2576 }
2577
2578 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_006, testing::ext::TestSize.Level1)
2579 {
2580 std::string pkgName = "com.ohos.test";
2581 std::string invalidNetworkId = "networkId";
2582 int32_t securityLevel = 0;
2583 EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2584 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2585 EXPECT_CALL(*softbusListenerMock_, GetDeviceSecurityLevel(_, _)).WillOnce(Return(DM_OK));
2586 int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2587 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2588 EXPECT_EQ(ret, DM_OK);
2589 }
2590
2591 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_004, testing::ext::TestSize.Level1)
2592 {
2593 std::string pkgName = "pkgName";
2594 std::string networkId = "network_id";
2595 std::string uuid = "13345689";
2596 if (DeviceManagerService::GetInstance().softbusListener_ == nullptr) {
2597 DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2598 }
2599 EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(DM_OK));
2600 EXPECT_CALL(*appManagerMock_, GetAppId()).WillOnce(Return("appId"));
2601 int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
2602 DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2603 EXPECT_EQ(ret, DM_OK);
2604 }
2605
2606 HWTEST_F(DeviceManagerServiceTest, OpenAuthSessionWithPara_001, testing::ext::TestSize.Level1)
2607 {
2608 const std::string deviceId = "OpenAuthSessionWithPara";
2609 int32_t actionId = 0;
2610 bool isEnable160m = false;
2611 int32_t ret = DeviceManagerService::GetInstance().OpenAuthSessionWithPara(deviceId, actionId, isEnable160m);
2612 EXPECT_NE(ret, DM_OK);
2613 }
2614 } // namespace
2615 } // namespace DistributedHardware
2616 } // namespace OHOS
2617