From fd56fe7c524a21e2502d8a20524a93570105480e Mon Sep 17 00:00:00 2001 From: YinZong Date: Mon, 10 Feb 2025 00:47:00 +0000 Subject: [PATCH 1/2] update interfaces/kits/js/file_share/grant_permissions.cpp. Signed-off-by: YinZong --- interfaces/kits/js/file_share/grant_permissions.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/interfaces/kits/js/file_share/grant_permissions.cpp b/interfaces/kits/js/file_share/grant_permissions.cpp index d0c3c1091..30385b04c 100644 --- a/interfaces/kits/js/file_share/grant_permissions.cpp +++ b/interfaces/kits/js/file_share/grant_permissions.cpp @@ -430,7 +430,7 @@ napi_value CheckPathPermission(napi_env env, napi_callback_info info) auto [succTokenId, tokenId] = NVal(env, funcArg[NARG_POS::FIRST]).ToInt32(); uint64_t callerTokenId = OHOS::IPCSkeleton::GetCallingTokenID(); - if (tokenId != callerTokenId) { + if (static_cast(tokenId) != callerTokenId) { if (!CheckTokenIdPermission(callerTokenId, "ohos.permission.CHECK_SANDBOX_POLICY")) { NError(E_PERMISSION).ThrowErr(env); return nullptr; -- Gitee From 57b3ed8a75e383ca57389620b599a8ccab691398 Mon Sep 17 00:00:00 2001 From: YinZong Date: Mon, 10 Feb 2025 00:57:24 +0000 Subject: [PATCH 2/2] update interfaces/kits/js/file_share/grant_permissions.cpp. Signed-off-by: YinZong --- interfaces/kits/js/file_share/grant_permissions.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/interfaces/kits/js/file_share/grant_permissions.cpp b/interfaces/kits/js/file_share/grant_permissions.cpp index 30385b04c..191a4fa6e 100644 --- a/interfaces/kits/js/file_share/grant_permissions.cpp +++ b/interfaces/kits/js/file_share/grant_permissions.cpp @@ -429,8 +429,8 @@ napi_value CheckPathPermission(napi_env env, napi_callback_info info) auto [succTokenId, tokenId] = NVal(env, funcArg[NARG_POS::FIRST]).ToInt32(); - uint64_t callerTokenId = OHOS::IPCSkeleton::GetCallingTokenID(); - if (static_cast(tokenId) != callerTokenId) { + uint32_t callerTokenId = OHOS::IPCSkeleton::GetCallingTokenID(); + if (tokenId != static_cast(callerTokenId)) { if (!CheckTokenIdPermission(callerTokenId, "ohos.permission.CHECK_SANDBOX_POLICY")) { NError(E_PERMISSION).ThrowErr(env); return nullptr; -- Gitee