1 /*
2  * Copyright (c) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "el5_filekey_manager_service_unittest.h"
17 
18 #include "accesstoken_kit.h"
19 #include "el5_filekey_callback_stub.h"
20 #include "token_setproc.h"
21 
22 using namespace testing::ext;
23 using namespace OHOS::Security::AccessToken;
24 
SetUpTestCase()25 void El5FilekeyManagerServiceTest::SetUpTestCase()
26 {
27 }
28 
TearDownTestCase()29 void El5FilekeyManagerServiceTest::TearDownTestCase()
30 {
31 }
32 
SetUp()33 void El5FilekeyManagerServiceTest::SetUp()
34 {
35     el5FilekeyManagerService_ = DelayedSingleton<El5FilekeyManagerService>::GetInstance();
36     el5FilekeyManagerService_->Init();
37 }
38 
TearDown()39 void El5FilekeyManagerServiceTest::TearDown()
40 {
41 }
42 
43 class TestEl5FilekeyCallback : public El5FilekeyCallbackStub {
44 public:
OnRegenerateAppKey(std::vector<AppKeyInfo> & infos)45     void OnRegenerateAppKey(std::vector<AppKeyInfo> &infos)
46     {
47         GTEST_LOG_(INFO) << "OnRegenerateAppKey.";
48     }
49 };
50 
51 /**
52  * @tc.name: AcquireAccess001
53  * @tc.desc: Acquire media type data access without permission.
54  * @tc.type: FUNC
55  * @tc.require: issueI9JGMV
56  */
57 HWTEST_F(El5FilekeyManagerServiceTest, AcquireAccess001, TestSize.Level1)
58 {
59     ASSERT_EQ(el5FilekeyManagerService_->AcquireAccess(MEDIA_DATA), EFM_ERR_NO_PERMISSION);
60 }
61 
62 /**
63  * @tc.name: AcquireAccess002
64  * @tc.desc: Acquire all type data access without permission.
65  * @tc.type: FUNC
66  * @tc.require: issueI9JGMV
67  */
68 HWTEST_F(El5FilekeyManagerServiceTest, AcquireAccess002, TestSize.Level1)
69 {
70     ASSERT_EQ(el5FilekeyManagerService_->AcquireAccess(ALL_DATA), EFM_ERR_NO_PERMISSION);
71 }
72 
73 /**
74  * @tc.name: AcquireAccess003
75  * @tc.desc: Acquire invalid type data access.
76  * @tc.type: FUNC
77  * @tc.require: issueIAD2MD
78  */
79 HWTEST_F(El5FilekeyManagerServiceTest, AcquireAccess003, TestSize.Level1)
80 {
81     uint32_t type = 3;
82     ASSERT_EQ(el5FilekeyManagerService_->AcquireAccess(static_cast<DataLockType>(type)), EFM_ERR_NO_PERMISSION);
83 }
84 
85 /**
86  * @tc.name: ReleaseAccess001
87  * @tc.desc: Release media type data access without permission.
88  * @tc.type: FUNC
89  * @tc.require: issueI9JGMV
90  */
91 HWTEST_F(El5FilekeyManagerServiceTest, ReleaseAccess001, TestSize.Level1)
92 {
93     ASSERT_EQ(el5FilekeyManagerService_->ReleaseAccess(MEDIA_DATA), EFM_ERR_NO_PERMISSION);
94 }
95 
96 /**
97  * @tc.name: ReleaseAccess002
98  * @tc.desc: Release all type data access without permission.
99  * @tc.type: FUNC
100  * @tc.require: issueI9JGMV
101  */
102 HWTEST_F(El5FilekeyManagerServiceTest, ReleaseAccess002, TestSize.Level1)
103 {
104     ASSERT_EQ(el5FilekeyManagerService_->ReleaseAccess(ALL_DATA), EFM_ERR_NO_PERMISSION);
105 }
106 
107 /**
108  * @tc.name: GenerateAppKey001
109  * @tc.desc: Generate app key by uid and bundle name without permission.
110  * @tc.type: FUNC
111  * @tc.require: issueI9JGMV
112  */
113 HWTEST_F(El5FilekeyManagerServiceTest, GenerateAppKey001, TestSize.Level1)
114 {
115     int32_t uid = 12345;
116     std::string bundleName = "com.ohos.el5_test";
117     std::string keyId;
118     ASSERT_EQ(el5FilekeyManagerService_->GenerateAppKey(uid, bundleName, keyId), EFM_ERR_NO_PERMISSION);
119 }
120 
121 /**
122  * @tc.name: DeleteAppKey001
123  * @tc.desc: Delete app key by bundle name and user id without permission.
124  * @tc.type: FUNC
125  * @tc.require: issueI9JGMV
126  */
127 HWTEST_F(El5FilekeyManagerServiceTest, DeleteAppKey001, TestSize.Level1)
128 {
129     std::string bundleName = "";
130     int32_t userId = 100;
131     ASSERT_EQ(el5FilekeyManagerService_->DeleteAppKey(bundleName, userId), EFM_ERR_NO_PERMISSION);
132 }
133 
134 /**
135  * @tc.name: GetUserAppKey001
136  * @tc.desc: Find key infos of the specified user id without permission.
137  * @tc.type: FUNC
138  * @tc.require: issueI9JGMV
139  */
140 HWTEST_F(El5FilekeyManagerServiceTest, GetUserAppKey001, TestSize.Level1)
141 {
142     int32_t userId = 100;
143     std::vector<std::pair<int32_t, std::string>> keyInfos;
144     ASSERT_EQ(el5FilekeyManagerService_->GetUserAppKey(userId, false, keyInfos), EFM_ERR_NO_PERMISSION);
145 }
146 
147 /**
148  * @tc.name: GetUserAppKey002
149  * @tc.desc: Find key infos of the specified user id without permission, userId < 0.
150  * @tc.type: FUNC
151  * @tc.require: issueI9JGMV
152  */
153 HWTEST_F(El5FilekeyManagerServiceTest, GetUserAppKey002, TestSize.Level1)
154 {
155     int32_t userId = -100;
156     std::vector<std::pair<int32_t, std::string>> keyInfos;
157     ASSERT_EQ(el5FilekeyManagerService_->GetUserAppKey(userId, false, keyInfos), EFM_ERR_INVALID_PARAMETER);
158 }
159 
160 /**
161  * @tc.name: ChangeUserAppkeysLoadInfo001
162  * @tc.desc: Change key infos of the specified user id without permission.
163  * @tc.type: FUNC
164  * @tc.require: issueI9JGMV
165  */
166 HWTEST_F(El5FilekeyManagerServiceTest, ChangeUserAppkeysLoadInfo001, TestSize.Level1)
167 {
168     int32_t userId = 100;
169     std::vector<std::pair<std::string, bool>> loadInfos;
170     loadInfos.emplace_back(std::make_pair("", true));
171     ASSERT_EQ(el5FilekeyManagerService_->ChangeUserAppkeysLoadInfo(userId, loadInfos), EFM_ERR_NO_PERMISSION);
172 }
173 
174 /**
175  * @tc.name: ChangeUserAppkeysLoadInfo002
176  * @tc.desc: Change key infos of the specified user id without permission, userId < 0.
177  * @tc.type: FUNC
178  * @tc.require: issueI9JGMV
179  */
180 HWTEST_F(El5FilekeyManagerServiceTest, ChangeUserAppkeysLoadInfo002, TestSize.Level1)
181 {
182     int32_t userId = -100;
183     std::vector<std::pair<std::string, bool>> loadInfos;
184     loadInfos.emplace_back(std::make_pair("", true));
185     ASSERT_EQ(el5FilekeyManagerService_->ChangeUserAppkeysLoadInfo(userId, loadInfos), EFM_ERR_INVALID_PARAMETER);
186 }
187 
188 /**
189  * @tc.name: SetFilePathPolicy001
190  * @tc.desc: Set path policy without permission.
191  * @tc.type: FUNC
192  * @tc.require: issueI9Q6K2
193  */
194 HWTEST_F(El5FilekeyManagerServiceTest, SetFilePathPolicy001, TestSize.Level1)
195 {
196     ASSERT_EQ(el5FilekeyManagerService_->SetFilePathPolicy(), EFM_ERR_NO_PERMISSION);
197 }
198 
199 /**
200  * @tc.name: RegisterCallback001
201  * @tc.desc: Register app key generation callback without permission.
202  * @tc.type: FUNC
203  * @tc.require: issueI9Q6K2
204  */
205 HWTEST_F(El5FilekeyManagerServiceTest, RegisterCallback001, TestSize.Level1)
206 {
207     ASSERT_EQ(el5FilekeyManagerService_->RegisterCallback((new TestEl5FilekeyCallback())), EFM_ERR_NO_PERMISSION);
208 }
209 
210 /**
211  * @tc.name: SetPolicyScreenLocked001
212  * @tc.desc: SetPolicyScreenLocked
213  * @tc.type: FUNC
214  * @tc.require: issueI9Q6K2
215  */
216 HWTEST_F(El5FilekeyManagerServiceTest, SetPolicyScreenLocked001, TestSize.Level1)
217 {
218     ASSERT_EQ(el5FilekeyManagerService_->SetPolicyScreenLocked(), EFM_SUCCESS);
219 }
220 
221 /**
222  * @tc.name: Dump001
223  * @tc.desc: Dump fd > 0
224  * @tc.type: FUNC
225  * @tc.require: issueI9Q6K2
226  */
227 HWTEST_F(El5FilekeyManagerServiceTest, Dump001, TestSize.Level1)
228 {
229     int fd = 1;
230     std::vector<std::u16string> args = {};
231     ASSERT_EQ(el5FilekeyManagerService_->Dump(fd, args), EFM_SUCCESS);
232 }
233 
234 /**
235  * @tc.name: Dump002
236  * @tc.desc: Dump fd < 0
237  * @tc.type: FUNC
238  * @tc.require: issueI9Q6K2
239  */
240 HWTEST_F(El5FilekeyManagerServiceTest, Dump002, TestSize.Level1)
241 {
242     int fd = -1;
243     std::vector<std::u16string> args = {};
244     ASSERT_EQ(el5FilekeyManagerService_->Dump(fd, args), EFM_ERR_INVALID_PARAMETER);
245 }
246 
247 /**
248  * @tc.name: Dump003
249  * @tc.desc: Dump args != null
250  * @tc.type: FUNC
251  * @tc.require: issueI9Q6K2
252  */
253 HWTEST_F(El5FilekeyManagerServiceTest, Dump003, TestSize.Level1)
254 {
255     int fd = 1;
256     std::vector<std::u16string> args = {u"-h"};
257     ASSERT_EQ(el5FilekeyManagerService_->Dump(fd, args), EFM_SUCCESS);
258 }
259 
260 /**
261  * @tc.name: PostDelayedUnloadTask001
262  * @tc.desc: PostDelayedUnloadTask fun test.
263  * @tc.type: FUNC
264  * @tc.require: issueI9Q6K2
265  */
266 HWTEST_F(El5FilekeyManagerServiceTest, PostDelayedUnloadTask001, TestSize.Level1)
267 {
268 #ifndef EVENTHANDLER_ENABLE
269 #define EVENTHANDLER_ENABLE
270     int32_t delayedTime = 1;
271     el5FilekeyManagerService_->PostDelayedUnloadTask(delayedTime);
272 #endif
273 }
274 
275 /**
276  * @tc.name: CancelDelayedUnloadTask001
277  * @tc.desc: CancelDelayedUnloadTask fun test.
278  * @tc.type: FUNC
279  * @tc.require: issueI9Q6K2
280  */
281 HWTEST_F(El5FilekeyManagerServiceTest, CancelDelayedUnloadTask001, TestSize.Level1)
282 {
283 #ifndef EVENTHANDLER_ENABLE
284 #define EVENTHANDLER_ENABLE
285     el5FilekeyManagerService_->CancelDelayedUnloadTask();
286 #endif
287 }
288 
289 /**
290  * @tc.name: IsSystemApp001
291  * @tc.desc: IsSystemApp fun test.
292  * @tc.type: FUNC
293  * @tc.require: issueI9Q6K2
294  */
295 HWTEST_F(El5FilekeyManagerServiceTest, IsSystemApp001, TestSize.Level1)
296 {
297     ASSERT_EQ(el5FilekeyManagerService_->IsSystemApp(), false);
298 }
299