diff --git a/services/common/test/unittest/parse_util_test.cpp b/services/common/test/unittest/parse_util_test.cpp index 91f4560f43eb197f0e21ed05ff75108f88697c35..f7fee11c88a82e13f8c97f039650edd2da898a56 100644 --- a/services/common/test/unittest/parse_util_test.cpp +++ b/services/common/test/unittest/parse_util_test.cpp @@ -28,6 +28,7 @@ namespace { const std::string TEST_RESOURCE_PATH = "/data/test/resource/samgr/profile/"; const std::u16string TEST_PROCESS_NAME = u"sa_test"; const int32_t TEST_PROFILE_SAID = 9999; + const int32_t TEST_PROFILE_SAID_INVAILD = 9990; } class ParseUtilTest : public testing::Test { @@ -447,7 +448,8 @@ HWTEST_F(ParseUtilTest, GetProfile001, TestSize.Level1) * @tc.expected: step1. return true when load not exist file */ SaProfile saProfile; - bool ret = parser_->GetProfile(9999, saProfile); + bool ret = parser_->GetProfile(TEST_PROFILE_SAID, saProfile); + parser_->OpenSo(); EXPECT_FALSE(ret); } @@ -466,10 +468,77 @@ HWTEST_F(ParseUtilTest, GetProfile002, TestSize.Level1) bool ret = parser_->ParseSaProfiles(TEST_RESOURCE_PATH + "multi_sa_profile.xml"); EXPECT_TRUE(ret); SaProfile saProfile; - ret = parser_->GetProfile(9999, saProfile); + ret = parser_->GetProfile(TEST_PROFILE_SAID, saProfile); EXPECT_TRUE(ret); - EXPECT_EQ(saProfile.saId, 9999); + EXPECT_EQ(saProfile.saId, TEST_PROFILE_SAID); EXPECT_TRUE(saProfile.runOnCreate); } + +/** + * @tc.name: LoadSaLib001 + * @tc.desc: Verify if can load salib + * @tc.type: FUNC + */ +HWTEST_F(ParseUtilTest, LoadSaLib001, TestSize.Level1) +{ + DTEST_LOG << " LoadSaLib001 start " << std::endl; + /** + * @tc.steps: step1. check exsit salib + * @tc.expected: step1. return true when load exist salib + */ + bool ret = parser_->ParseSaProfiles(TEST_RESOURCE_PATH + "multi_sa_profile.xml"); + EXPECT_TRUE(ret); + ret = parser_->LoadSaLib(TEST_PROFILE_SAID); + EXPECT_TRUE(ret); +} + +/** + * @tc.name: LoadSaLib002 + * @tc.desc: Verify if can load salib + * @tc.type: FUNC + */ +HWTEST_F(ParseUtilTest, LoadSaLib002, TestSize.Level1) +{ + DTEST_LOG << " LoadSaLib002 start " << std::endl; + /** + * @tc.steps: step1. check exsit salib + * @tc.expected: step1. return false when load not exist salib + */ + bool ret = parser_->ParseSaProfiles(TEST_RESOURCE_PATH + "multi_sa_profile.xml"); + EXPECT_TRUE(ret); + ret = parser_->LoadSaLib(TEST_PROFILE_SAID_INVAILD); + EXPECT_FALSE(ret); +} + +/** + * @tc.name: GetProcessName001 + * @tc.desc: Verify if can get procesname + * @tc.type: FUNC + */ +HWTEST_F(ParseUtilTest, GetProcessName001, TestSize.Level1) +{ + DTEST_LOG << " GetProcessName001 " << std::endl; + /** + * @tc.steps: step1. get SaProfiles + * @tc.expected: step1. return true when SaProfiles + */ + bool ret = parser_->ParseSaProfiles(TEST_RESOURCE_PATH + "multi_sa_profile.xml"); + EXPECT_TRUE(ret); + std::u16string Name = parser_->GetProcessName(); + EXPECT_EQ(Str16ToStr8(Name), "test"); +} + +HWTEST_F(ParseUtilTest, GetProcessName002, TestSize.Level1) +{ + DTEST_LOG << " GetProcessName002 " << std::endl; + /** + * @tc.steps: step1. get SaProfiles + * @tc.expected: step1. return true when SaProfiles + */ + bool ret = parser_->ParseSaProfiles(TEST_RESOURCE_PATH + "multi_sa_profile.xml"); + EXPECT_TRUE(ret); + std::u16string Name = parser_->GetProcessName(); + EXPECT_NE(Str16ToStr8(Name), "test_1"); +} } // namespace SAMGR } // namespace OHOS diff --git a/services/samgr/native/test/unittest/BUILD.gn b/services/samgr/native/test/unittest/BUILD.gn index 0badfe5b50f6f9dcad9cd0702d3e332b9e9c5aff..6fb219d52f7af3366221bc047031c3cb7ccb46d6 100644 --- a/services/samgr/native/test/unittest/BUILD.gn +++ b/services/samgr/native/test/unittest/BUILD.gn @@ -73,6 +73,100 @@ ohos_unittest("SystemAbilityMgrTest") { ] } +ohos_unittest("SystemAbilityMgrProxyTest") { + module_out_path = module_output_path + + sources = [ + "${samgr_dir}/utils/native/source/tools.cpp", + "${samgr_services_dir}/source/ability_death_recipient.cpp", + "${samgr_services_dir}/source/system_ability_load_callback_proxy.cpp", + "${samgr_services_dir}/source/system_ability_manager.cpp", + "${samgr_services_dir}/source/system_ability_manager_stub.cpp", + "${samgr_services_dir}/source/system_ability_status_change_proxy.cpp", + "${samgr_services_dir}/test/unittest/src/itest_transaction_service.cpp", + "${samgr_services_dir}/test/unittest/src/sa_status_change_mock.cpp", + "${samgr_services_dir}/test/unittest/src/system_ability_mgr_proxy_test.cpp", + "//foundation/systemabilitymgr/samgr/services/dfx/source/hisysevent_adapter.cpp", + ] + + configs = [ + ":sam_test_config", + "${samgr_dir}/interfaces/innerkits/lsamgr:config_samgr", + "${samgr_dir}/services/samgr/native:sam_config", + ] + + cflags = [] + if (target_cpu == "arm") { + cflags += [ "-DBINDER_IPC_32BIT" ] + } + + deps = [ + "${samgr_dir}/interfaces/innerkits/common:samgr_common", + "${samgr_dir}/interfaces/innerkits/lsamgr:lsamgr", + "${samgr_dir}/interfaces/innerkits/samgr_proxy:samgr_proxy", + "//third_party/googletest:gtest_main", + ] + + external_deps = [ + "access_token:libaccesstoken_sdk", + "eventhandler:libeventhandler", + "hisysevent_native:libhisysevent", + "hitrace_native:hitrace_meter", + "hiviewdfx_hilog_native:libhilog", + "init:libbegetutil", + "ipc:ipc_core", + "ipc:libdbinder", + "utils_base:utils", + ] +} + +ohos_unittest("LocalAbilityManagerProxyTest") { + module_out_path = module_output_path + + sources = [ + "${samgr_dir}/utils/native/source/tools.cpp", + "${samgr_services_dir}/source/ability_death_recipient.cpp", + "${samgr_services_dir}/source/system_ability_load_callback_proxy.cpp", + "${samgr_services_dir}/source/system_ability_manager.cpp", + "${samgr_services_dir}/source/system_ability_manager_stub.cpp", + "${samgr_services_dir}/source/system_ability_status_change_proxy.cpp", + "${samgr_services_dir}/test/unittest/src/itest_transaction_service.cpp", + "${samgr_services_dir}/test/unittest/src/local_ability_manager_proxy_test.cpp", + "${samgr_services_dir}/test/unittest/src/sa_status_change_mock.cpp", + "//foundation/systemabilitymgr/samgr/services/dfx/source/hisysevent_adapter.cpp", + ] + + configs = [ + ":sam_test_config", + "${samgr_dir}/interfaces/innerkits/lsamgr:config_samgr", + "${samgr_dir}/services/samgr/native:sam_config", + ] + + cflags = [] + if (target_cpu == "arm") { + cflags += [ "-DBINDER_IPC_32BIT" ] + } + + deps = [ + "${samgr_dir}/interfaces/innerkits/common:samgr_common", + "${samgr_dir}/interfaces/innerkits/lsamgr:lsamgr", + "${samgr_dir}/interfaces/innerkits/samgr_proxy:samgr_proxy", + "//third_party/googletest:gtest_main", + ] + + external_deps = [ + "access_token:libaccesstoken_sdk", + "eventhandler:libeventhandler", + "hisysevent_native:libhisysevent", + "hitrace_native:hitrace_meter", + "hiviewdfx_hilog_native:libhilog", + "init:libbegetutil", + "ipc:ipc_core", + "ipc:libdbinder", + "utils_base:utils", + ] +} + ohos_executable("ondemand") { sources = [ "./src/ondemand_helper.cpp" ] configs = [ diff --git a/services/samgr/native/test/unittest/include/local_ability_manager_proxy_test.h b/services/samgr/native/test/unittest/include/local_ability_manager_proxy_test.h new file mode 100644 index 0000000000000000000000000000000000000000..90bfe8aa26297461b62451dc5c57590d77bb8ae3 --- /dev/null +++ b/services/samgr/native/test/unittest/include/local_ability_manager_proxy_test.h @@ -0,0 +1,30 @@ +/* + * Copyright (c) 2022 Huawei Device Co., Ltd. + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#ifndef LOCAL_ABILITY_MANAGER_PROXY_TEST_H +#define LOCAL_ABILITY_MANAGER_PROXY_TEST_H + +#include "gtest/gtest.h" + +namespace OHOS { +class LocalAbilityManagerProxyTest : public testing::Test { +public: + static void SetUpTestCase(); + static void TearDownTestCase(); + void SetUp(); + void TearDown(); +}; +} // OHOS +#endif /* LOCAL_ABILITY_MANAGER_PROXY_TEST_H */ diff --git a/services/samgr/native/test/unittest/include/ondemand_helper.h b/services/samgr/native/test/unittest/include/ondemand_helper.h index 31734a9cc0b38de422c760516dafc2f3f43b5197..6d4877fb624b1cbae8255990021dc91d0d124771 100644 --- a/services/samgr/native/test/unittest/include/ondemand_helper.h +++ b/services/samgr/native/test/unittest/include/ondemand_helper.h @@ -33,7 +33,7 @@ public: void LoadRemoteAbilityMutiSACb(int32_t systemAbilityId, const std::string& deviceId); void LoadRemoteAbilityMutiCb(int32_t systemAbilityId, const std::string& deviceId); void LoadRemoteAbilityPressure(int32_t systemAbilityId, const std::string& deviceId); - + sptr GetSystemAbility(int32_t systemAbilityId); void OnLoadSystemAbility(int32_t systemAbilityId); protected: diff --git a/services/samgr/native/test/unittest/include/system_ability_mgr_proxy_test.h b/services/samgr/native/test/unittest/include/system_ability_mgr_proxy_test.h new file mode 100644 index 0000000000000000000000000000000000000000..b0621267be80696fec8d6e0608ea135e055387af --- /dev/null +++ b/services/samgr/native/test/unittest/include/system_ability_mgr_proxy_test.h @@ -0,0 +1,30 @@ +/* + * Copyright (c) 2022 Huawei Device Co., Ltd. + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#ifndef SAMGR_TEST_UNITTEST_INCLUDE_SYSTEM_ABILITY_MGR_PROXY_TEST_H +#define SAMGR_TEST_UNITTEST_INCLUDE_SYSTEM_ABILITY_MGR_PROXY_TEST_H + +#include "gtest/gtest.h" + +namespace OHOS { +class SystemAbilityMgrProxyTest : public testing::Test { +public: + static void SetUpTestCase(); + static void TearDownTestCase(); + void SetUp(); + void TearDown(); +}; +} // OHOS +#endif /* SAMGR_TEST_UNITTEST_INCLUDE_SYSTEM_ABILITY_MGR_TEST_H */ diff --git a/services/samgr/native/test/unittest/src/local_ability_manager_proxy_test.cpp b/services/samgr/native/test/unittest/src/local_ability_manager_proxy_test.cpp new file mode 100644 index 0000000000000000000000000000000000000000..f1b89dfc927b2ea4a3a57c86e6d0cd4ee9d32a29 --- /dev/null +++ b/services/samgr/native/test/unittest/src/local_ability_manager_proxy_test.cpp @@ -0,0 +1,85 @@ +/* + * Copyright (c) 2022 Huawei Device Co., Ltd. + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include "system_ability_manager_proxy.h" + +#include "if_system_ability_manager.h" +#include "itest_transaction_service.h" +#include "local_ability_manager_proxy.h" +#include "local_ability_manager_proxy_test.h" +#include "string_ex.h" +#include "system_ability_definition.h" +#include "system_ability_manager.h" +#include "test_log.h" + +#define private public + +using namespace std; +using namespace testing; +using namespace testing::ext; +using namespace OHOS; + +namespace OHOS { +namespace { +constexpr int32_t TEST_SAID_INVAILD = -1; +constexpr int32_t TEST_SAID_VAILD = 9999; +} +void LocalAbilityManagerProxyTest::SetUpTestCase() +{ + DTEST_LOG << "SetUpTestCase" << std::endl; +} + +void LocalAbilityManagerProxyTest::TearDownTestCase() +{ + DTEST_LOG << "TearDownTestCase" << std::endl; +} + +void LocalAbilityManagerProxyTest::SetUp() +{ + DTEST_LOG << "SetUp" << std::endl; +} + +void LocalAbilityManagerProxyTest::TearDown() +{ + DTEST_LOG << "TearDown" << std::endl; +} + +/** + * @tc.name: LocalAbilityManagerProxy001 + * @tc.desc: LocalAbilityManagerProxy001 + * @tc.type: FUNC + */ +HWTEST_F(LocalAbilityManagerProxyTest, LocalAbilityManagerProxy001, TestSize.Level1) +{ + sptr testAbility(new TestTransactionService()); + sptr LocalAbility(new LocalAbilityManagerProxy(testAbility)); + ASSERT_TRUE(LocalAbility != nullptr); + bool res = LocalAbility->StartAbility(TEST_SAID_INVAILD); + EXPECT_FALSE(res); +} + +/** + * @tc.name: LocalAbilityManagerProxy002 + * @tc.desc: LocalAbilityManagerProxy002 + * @tc.type: FUNC + */ +HWTEST_F(LocalAbilityManagerProxyTest, LocalAbilityManagerProxy002, TestSize.Level1) +{ + sptr testAbility(new TestTransactionService()); + sptr LocalAbility(new LocalAbilityManagerProxy(testAbility)); + ASSERT_TRUE(LocalAbility != nullptr); + bool res = LocalAbility->StartAbility(TEST_SAID_VAILD); + EXPECT_TRUE(res); +} +} \ No newline at end of file diff --git a/services/samgr/native/test/unittest/src/system_ability_mgr_proxy_test.cpp b/services/samgr/native/test/unittest/src/system_ability_mgr_proxy_test.cpp new file mode 100644 index 0000000000000000000000000000000000000000..5a8fac2fc85e11f84ecc9e55103a632d7ce65f70 --- /dev/null +++ b/services/samgr/native/test/unittest/src/system_ability_mgr_proxy_test.cpp @@ -0,0 +1,141 @@ +/* + * Copyright (c) 2022 Huawei Device Co., Ltd. + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include "if_system_ability_manager.h" +#include "iservice_registry.h" +#include "itest_transaction_service.h" +#include "sa_status_change_mock.h" +#include "string_ex.h" +#include "system_ability_definition.h" +#include "system_ability_manager.h" +#include "system_ability_manager_proxy.h" +#include "system_ability_mgr_proxy_test.h" +#include "test_log.h" + +#define private public + +using namespace std; +using namespace testing; +using namespace testing::ext; +using namespace OHOS; + +namespace OHOS { +namespace { +constexpr int32_t TEST_ID_VAILD = 9999; +constexpr int32_t TEST_ID_INVAILD = 9990; +} +void SystemAbilityMgrProxyTest::SetUpTestCase() +{ + DTEST_LOG << "SetUpTestCase" << std::endl; +} + +void SystemAbilityMgrProxyTest::TearDownTestCase() +{ + DTEST_LOG << "TearDownTestCase" << std::endl; +} + +void SystemAbilityMgrProxyTest::SetUp() +{ + DTEST_LOG << "SetUp" << std::endl; +} + +void SystemAbilityMgrProxyTest::TearDown() +{ + DTEST_LOG << "TearDown" << std::endl; +} + +/** + * @tc.name: GetRegistryRemoteObject001 test + * @tc.desc: test for get RegistryRemoteObject + * @tc.type: FUNC + * @tc.require: I5KMF7 + */ +HWTEST_F(SystemAbilityMgrProxyTest, GetRegistryRemoteObject001, TestSize.Level1) +{ + sptr remote = SystemAbilityManagerClient::GetInstance().GetRegistryRemoteObject(); + ASSERT_TRUE(remote == nullptr); +} + +/** + * @tc.name: AddSystemProcess001 + * @tc.desc: check add process remoteobject + * @tc.type: FUNC + */ +HWTEST_F(SystemAbilityMgrProxyTest, AddSystemProcess001, TestSize.Level1) +{ + DTEST_LOG << " AddSystemProcess001 start " << std::endl; + /** + * @tc.steps: step1. get samgr instance + * @tc.expected: step1. samgr instance not nullptr + */ + sptr sm = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); + ASSERT_TRUE(sm != nullptr); + sptr remote(new TestTransactionService()); + ASSERT_TRUE(remote != nullptr); + u16string procName(u""); + int32_t ret = sm->AddSystemProcess(procName, remote); + ASSERT_TRUE(ret == ERR_INVALID_VALUE); +} + +/** + * @tc.name: AddSystemProcess002 + * @tc.desc: check add process remoteobject + * @tc.type: FUNC + */ +HWTEST_F(SystemAbilityMgrProxyTest, AddSystemProcess002, TestSize.Level1) +{ + DTEST_LOG << " AddSystemProcess002 start " << std::endl; + /** + * @tc.steps: step1. get samgr instance + * @tc.expected: step1. samgr instance not nullptr + */ + sptr sm = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); + ASSERT_TRUE(sm != nullptr); + sptr remote(new TestTransactionService()); + ASSERT_TRUE(remote != nullptr); + u16string procName(u"test_process"); + int32_t ret = sm->AddSystemProcess(procName, remote); + EXPECT_EQ(ret, ERR_OK); +} + +/** + * @tc.name: UnSubscribeSystemAbility001 + * @tc.desc: UnSubscribeSystemAbility001 + * @tc.type: FUNC + */ +HWTEST_F(SystemAbilityMgrProxyTest, UnSubscribeSystemAbility001, TestSize.Level1) +{ + sptr sm = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); + ASSERT_TRUE(sm != nullptr); + sptr callback(new SaStatusChangeMock()); + sm->SubscribeSystemAbility(TEST_ID_VAILD, callback); + int32_t res = sm->UnSubscribeSystemAbility(TEST_ID_VAILD, callback); + EXPECT_EQ(res, ERR_OK); +} + +/** + * @tc.name: UnSubscribeSystemAbility002 + * @tc.desc: UnSubscribeSystemAbility002 + * @tc.type: FUNC + */ +HWTEST_F(SystemAbilityMgrProxyTest, UnSubscribeSystemAbility002, TestSize.Level1) +{ + sptr sm = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); + ASSERT_TRUE(sm != nullptr); + sptr callback(new SaStatusChangeMock()); + sm->SubscribeSystemAbility(TEST_ID_VAILD, callback); + int32_t res = sm->UnSubscribeSystemAbility(TEST_ID_INVAILD, callback); + EXPECT_EQ(res, ERR_OK); +} +} diff --git a/services/samgr/native/test/unittest/src/system_ability_mgr_test.cpp b/services/samgr/native/test/unittest/src/system_ability_mgr_test.cpp index 05ee484e0f944dd1a6ce33dc8cea04b5c02815db..a405f81c20a32f537aa66f9b531f8866f8859ca6 100644 --- a/services/samgr/native/test/unittest/src/system_ability_mgr_test.cpp +++ b/services/samgr/native/test/unittest/src/system_ability_mgr_test.cpp @@ -13,13 +13,13 @@ * limitations under the License. */ +#include "system_ability_mgr_test.h" #include "if_system_ability_manager.h" #include "iservice_registry.h" #include "itest_transaction_service.h" #include "sa_status_change_mock.h" #include "string_ex.h" #include "system_ability_definition.h" -#include "system_ability_mgr_test.h" #include "test_log.h" #define private public @@ -685,6 +685,7 @@ HWTEST_F(SystemAbilityMgrTest, ReportLoadSAOverflow001, TestSize.Level1) * @tc.name: LoadRemoteSystemAbility001 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility001, TestSize.Level2) { @@ -700,6 +701,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility001, TestSize.Level2) * @tc.name: LoadRemoteSystemAbility002 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility002, TestSize.Level2) { @@ -715,6 +717,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility002, TestSize.Level2) * @tc.name: LoadRemoteSystemAbility002 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility003, TestSize.Level2) { @@ -730,6 +733,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility003, TestSize.Level2) * @tc.name: LoadRemoteSystemAbility004 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility004, TestSize.Level2) { @@ -745,6 +749,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility004, TestSize.Level2) * @tc.name: LoadRemoteSystemAbility004 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility005, TestSize.Level2) { @@ -760,6 +765,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility005, TestSize.Level2) * @tc.name: LoadRemoteSystemAbility004 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility006, TestSize.Level2) { @@ -775,6 +781,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadRemoteSystemAbility006, TestSize.Level2) * @tc.name: LoadSystemAbilityFromRpc001 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc001, TestSize.Level2) { @@ -790,6 +797,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc001, TestSize.Level2) * @tc.name: LoadSystemAbilityFromRpc002 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc002, TestSize.Level2) { @@ -805,6 +813,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc002, TestSize.Level2) * @tc.name: LoadSystemAbilityFromRpc003 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc003, TestSize.Level2) { @@ -819,6 +828,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc003, TestSize.Level2) * @tc.name: LoadSystemAbilityFromRpc004 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc004, TestSize.Level2) { @@ -833,6 +843,7 @@ HWTEST_F(SystemAbilityMgrTest, LoadSystemAbilityFromRpc004, TestSize.Level2) * @tc.name: DoMakeRemoteBinder001 * @tc.desc: load system ability with invalid systemAbilityId. * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, DoMakeRemoteBinder001, TestSize.Level2) { @@ -847,6 +858,7 @@ HWTEST_F(SystemAbilityMgrTest, DoMakeRemoteBinder001, TestSize.Level2) * @tc.name: startingAbilityMap_ test * @tc.desc: startingAbilityMap_ init * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest001, TestSize.Level1) { @@ -896,6 +908,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest001, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, one callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest002, TestSize.Level1) { @@ -926,6 +939,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest002, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest003, TestSize.Level1) { @@ -957,6 +971,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest003, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with no registered callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest004, TestSize.Level1) { @@ -988,6 +1003,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest004, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with some device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest005, TestSize.Level1) { @@ -1020,6 +1036,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest005, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with some device, one callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest006, TestSize.Level1) { @@ -1051,6 +1068,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest006, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback, some sa * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest007, TestSize.Level1) { @@ -1082,6 +1100,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest007, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest008, TestSize.Level1) { @@ -1115,6 +1134,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest008, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback, some sa * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest009, TestSize.Level1) { @@ -1147,6 +1167,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest009, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with some device, some callback, some sa * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest010, TestSize.Level1) { @@ -1187,6 +1208,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest010, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback, some sa * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest011, TestSize.Level1) { @@ -1228,6 +1250,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest011, TestSize.Level1) * @tc.name: startingAbilityMap_ test * @tc.desc: test for callback dead, with one device, some callback, some sa * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest012, TestSize.Level1) { @@ -1270,6 +1293,7 @@ HWTEST_F(SystemAbilityMgrTest, startingAbilityMapTest012, TestSize.Level1) * @tc.name: OnRemoteCallbackDied001 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied001, TestSize.Level1) { @@ -1298,6 +1322,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied001, TestSize.Level1) * @tc.name: OnRemoteCallbackDied002 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied002, TestSize.Level1) { @@ -1324,6 +1349,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied002, TestSize.Level1) * @tc.name: OnRemoteCallbackDied003 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied003, TestSize.Level1) { @@ -1351,6 +1377,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied003, TestSize.Level1) * @tc.name: OnRemoteCallbackDied004 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied004, TestSize.Level1) { @@ -1380,6 +1407,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied004, TestSize.Level1) * @tc.name: OnRemoteCallbackDied005 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied005, TestSize.Level1) { @@ -1409,6 +1437,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied005, TestSize.Level1) * @tc.name: OnRemoteCallbackDied006 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied006, TestSize.Level1) { @@ -1439,6 +1468,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied006, TestSize.Level1) * @tc.name: OnRemoteCallbackDied007 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied007, TestSize.Level1) { @@ -1468,6 +1498,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied007, TestSize.Level1) * @tc.name: OnRemoteCallbackDied008 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied008, TestSize.Level1) { @@ -1498,6 +1529,7 @@ HWTEST_F(SystemAbilityMgrTest, OnRemoteCallbackDied008, TestSize.Level1) * @tc.name: OnRemoteCallbackDied008 test * @tc.desc: test for callback dead, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, DoLoadRemoteSystemAbility001, TestSize.Level1) { @@ -1529,6 +1561,7 @@ HWTEST_F(SystemAbilityMgrTest, DoLoadRemoteSystemAbility001, TestSize.Level1) * @tc.name: DoLoadRemoteSystemAbility002 test * @tc.desc: test for load complete, with one device, one callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, DoLoadRemoteSystemAbility002, TestSize.Level1) { @@ -1557,6 +1590,7 @@ HWTEST_F(SystemAbilityMgrTest, DoLoadRemoteSystemAbility002, TestSize.Level1) * @tc.name: DoLoadRemoteSystemAbility003 test * @tc.desc: test for load complete, with one device, some callback * @tc.type: FUNC + * @tc.require: I5KMF7 */ HWTEST_F(SystemAbilityMgrTest, DoLoadRemoteSystemAbility003, TestSize.Level1) {