diff --git a/services/distributeddataservice/service/test/fuzztest/udmfservice_fuzzer/udmfservice_fuzzer.cpp b/services/distributeddataservice/service/test/fuzztest/udmfservice_fuzzer/udmfservice_fuzzer.cpp index 5c5ba402441df3e9e610cad29d90c7490c30157e..5c9200b098db637515f920133d59b7442f56cbc1 100644 --- a/services/distributeddataservice/service/test/fuzztest/udmfservice_fuzzer/udmfservice_fuzzer.cpp +++ b/services/distributeddataservice/service/test/fuzztest/udmfservice_fuzzer/udmfservice_fuzzer.cpp @@ -202,11 +202,10 @@ void AddPrivilegeDataFuzz(FuzzedDataProvider &provider) { "UdmfServiceStubFuzz", static_cast(IPCSkeleton::GetSelfTokenID()), std::move(executor) }); QueryOption query = GenerateFuzzQueryOption(provider); - Privilege privilege = { - .tokenId = 1, - .readPermission = "read", - .writePermission = "write" - }; + Privilege privilege; + privilege.tokenId = 1; + privilege.readPermission = "read"; + privilege.writePermission = "write"; MessageParcel request; request.WriteInterfaceToken(INTERFACE_TOKEN); @@ -267,9 +266,8 @@ void ObtainAsynProcessFuzz(FuzzedDataProvider &provider) groupId[i] = provider.ConsumeIntegralInRange(MINIMUM, MINIMUM); } std::string businessUdKey(groupId.begin(), groupId.end()); - AsyncProcessInfo processInfo = { - .businessUdKey = businessUdKey, - }; + AsyncProcessInfo processInfo; + processInfo.businessUdKey = businessUdKey; MessageParcel requestUpdate; requestUpdate.WriteInterfaceToken(INTERFACE_TOKEN); ITypesUtil::Marshal(requestUpdate, processInfo); @@ -427,16 +425,14 @@ void IsPermissionInCacheFuzz(FuzzedDataProvider &provider) void IsReadAndKeepFuzz(FuzzedDataProvider &provider) { std::shared_ptr udmfServiceImpl = std::make_shared(); - Privilege privilege = { - .tokenId = provider.ConsumeIntegral(), - .readPermission = "read", - .writePermission = "write" - }; - Privilege privilege2 = { - .tokenId = provider.ConsumeIntegral(), - .readPermission = "readAndKeep", - .writePermission = "write" - }; + Privilege privilege; + privilege.tokenId = provider.ConsumeIntegral(); + privilege.readPermission = "read"; + privilege.writePermission = "write"; + Privilege privilege2; + privilege2.tokenId = provider.ConsumeIntegral(); + privilege2.readPermission = "readAndKeep"; + privilege2.writePermission = "write"; std::vector privileges = { privilege, privilege2 }; QueryOption query = GenerateFuzzQueryOption(provider); udmfServiceImpl->IsReadAndKeep(privileges, query); diff --git a/services/distributeddataservice/service/test/udmf_db_corruption_mock_test.cpp b/services/distributeddataservice/service/test/udmf_db_corruption_mock_test.cpp index 7d5c7cc94d17191fada5e7ca9550cdbe6bc43b9f..2ad072531799d86f28f1d702b6543a906b830fc2 100644 --- a/services/distributeddataservice/service/test/udmf_db_corruption_mock_test.cpp +++ b/services/distributeddataservice/service/test/udmf_db_corruption_mock_test.cpp @@ -103,10 +103,9 @@ HWTEST_F(UdmfServiceImplDbCorruptionMockTest, SaveDataTest001, TestSize.Level1) DistributedData::AccountDelegate::GetInstance()->QueryForegroundUserId(foregroundUserId); key.append(std::to_string(foregroundUserId)); StoreCache::GetInstance().stores_.InsertOrAssign(key, store); - CustomOption option { - .intention = Intention::UD_INTENTION_DATA_HUB, - .tokenId = 1 - }; + CustomOption option; + option.intention = Intention::UD_INTENTION_DATA_HUB; + option.tokenId = 1; auto record = std::make_shared(); UnifiedData data; data.AddRecord(record); diff --git a/services/distributeddataservice/service/udmf/udmf_service_impl.cpp b/services/distributeddataservice/service/udmf/udmf_service_impl.cpp index 3cc61d68cc33023f0c0d88419fcdf94b28c2ada2..5a916467442912f2c266b435717f05b57723949c 100644 --- a/services/distributeddataservice/service/udmf/udmf_service_impl.cpp +++ b/services/distributeddataservice/service/udmf/udmf_service_impl.cpp @@ -1156,10 +1156,9 @@ int32_t UdmfServiceImpl::SetDelayInfo(const DataLoadInfo &dataLoadInfo, sptr(IPCSkeleton::GetCallingTokenID()), - }; + CustomOption option; + option.intention = UD_INTENTION_DRAG; + option.tokenId = static_cast(IPCSkeleton::GetCallingTokenID()); if (PreProcessUtils::FillRuntimeInfo(unifiedData, option) != E_OK) { ZLOGE("Imputation failed"); return E_ERROR; @@ -1174,10 +1173,9 @@ int32_t UdmfServiceImpl::PushDelayData(const std::string &key, UnifiedData &unif ZLOGE("DelayData callback no exist, key:%{public}s", key.c_str()); return E_ERROR; } - QueryOption query { - .tokenId = it.second.tokenId, - .key = key - }; + QueryOption query; + query.tokenId = it.second.tokenId; + query.key = key; if (option.tokenId != query.tokenId && !IsPermissionInCache(query)) { ZLOGE("No permission"); return E_NO_PERMISSION; @@ -1205,10 +1203,9 @@ int32_t UdmfServiceImpl::GetDataIfAvailable(const std::string &key, const DataLo sptr iUdmfNotifier, std::shared_ptr unifiedData) { ZLOGD("start"); - QueryOption query { - .tokenId = static_cast(IPCSkeleton::GetCallingTokenID()), - .key = key - }; + QueryOption query; + query.tokenId = static_cast(IPCSkeleton::GetCallingTokenID()); + query.key = key; if (unifiedData == nullptr) { ZLOGE("Data is null, key:%{public}s", key.c_str()); return E_ERROR; @@ -1221,10 +1218,9 @@ int32_t UdmfServiceImpl::GetDataIfAvailable(const std::string &key, const DataLo ZLOGE("Retrieve data failed, key:%{public}s", key.c_str()); return status; } - DelayGetDataInfo delayGetDataInfo = { - .dataCallback = iUdmfNotifier, - .tokenId = static_cast(IPCSkeleton::GetCallingTokenID()), - }; + DelayGetDataInfo delayGetDataInfo; + delayGetDataInfo.dataCallback = iUdmfNotifier; + delayGetDataInfo.tokenId = static_cast(IPCSkeleton::GetCallingTokenID()); delayDataCallback_.InsertOrAssign(key, std::move(delayGetDataInfo)); auto it = dataLoadCallback_.Find(key);