diff --git a/api/@ohos.application.uriPermissionManager.d.ts b/api/@ohos.application.uriPermissionManager.d.ts index ec1c433220f66863bc3303d44a1de9fb3733d477..6e32cc495abc8382132073ad150946bc8f7d7ec5 100644 --- a/api/@ohos.application.uriPermissionManager.d.ts +++ b/api/@ohos.application.uriPermissionManager.d.ts @@ -26,7 +26,7 @@ import type wantConstant from './@ohos.app.ability.wantConstant'; * * @namespace uriPermissionManager * @syscap SystemCapability.Ability.AbilityRuntime.Core - * @since 10 dynamic + * @since 10 dynamic * @since 20 static */ declare namespace uriPermissionManager { @@ -75,7 +75,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000060 - A sandbox application cannot grant URI permission. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use. - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function grantUriPermission( @@ -130,7 +130,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000060 - A sandbox application cannot grant URI permission. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use. - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function grantUriPermission(uri: string, flag: wantConstant.Flags, targetBundleName: string): Promise; @@ -184,7 +184,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000081 - Failed to obtain the target application information. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use. - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function grantUriPermission(uri: string, flag: wantConstant.Flags, targetBundleName: string, appCloneIndex: int): Promise; @@ -238,7 +238,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000059 - Invalid URI type. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function revokeUriPermission(uri: string, targetBundleName: string, callback: AsyncCallback): void; @@ -292,7 +292,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000059 - Invalid URI type. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function revokeUriPermission(uri: string, targetBundleName: string): Promise; @@ -332,7 +332,7 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000081 - Failed to obtain the target application information. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi hide this for inner system use - * @since 19 dynamic + * @since 19 dynamic * @since 20 static */ function revokeUriPermission(uri: string, targetBundleName: string, appCloneIndex: int): Promise; @@ -343,7 +343,7 @@ declare namespace uriPermissionManager { * @param { wantConstant.Flags } flag - wantConstant.Flags.FLAG_AUTH_READ_URI_PERMISSION, * wantConstant.Flags.FLAG_AUTH_WRITE_URI_PERMISSION or * wantConstant.Flags.FLAG_AUTH_PERSISTABLE_URI_PERMISSION. - * @param { int } targetTokenId - Indicates the token id of target application. + * @param { long } targetTokenId - Indicates the token id of target application. * @returns { Promise } - The promise returned by the function. * @throws { BusinessError } 202 - Not System App. Interface caller is not a system app. * @throws { BusinessError } 801 - Capability not supported. @@ -355,9 +355,9 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000094 - The target token ID is invalid. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi Hide this for inner system use. - * @since 20 dynamic + * @since 20 dynamic&static */ - function grantUriPermissionByKey(key: string, flag: wantConstant.Flags, targetTokenId: int): Promise; + function grantUriPermissionByKey(key: string, flag: wantConstant.Flags, targetTokenId: long): Promise; /** * Grant URIs in UDkey to another application @@ -366,8 +366,8 @@ declare namespace uriPermissionManager { * @param { wantConstant.Flags } flag - wantConstant.Flags.FLAG_AUTH_READ_URI_PERMISSION, * wantConstant.Flags.FLAG_AUTH_WRITE_URI_PERMISSION or * wantConstant.Flags.FLAG_AUTH_PERSISTABLE_URI_PERMISSION. - * @param { int } callerTokenId - Indicates the token id of caller application. - * @param { int } targetTokenId - Indicates the token id of target application. + * @param { long } callerTokenId - Indicates the token id of caller application. + * @param { long } targetTokenId - Indicates the token id of target application. * @returns { Promise } - The promise returned by the function. * @throws { BusinessError } 201 - Permission denied. * @throws { BusinessError } 202 - Not System App. Interface caller is not a system app. @@ -381,9 +381,9 @@ declare namespace uriPermissionManager { * @throws { BusinessError } 16000094 - The target token ID is invalid. * @syscap SystemCapability.Ability.AbilityRuntime.Core * @systemapi Hide this for inner system use. - * @since 20 dynamic + * @since 20 dynamic&static */ - function grantUriPermissionByKeyAsCaller(key: string, flag: wantConstant.Flags, callerTokenId: int, targetTokenId: int): Promise; + function grantUriPermissionByKeyAsCaller(key: string, flag: wantConstant.Flags, callerTokenId: long, targetTokenId: long): Promise; } export default uriPermissionManager; \ No newline at end of file