From 6cad81a726a27f8b3382e3b6e111f88c480b0373 Mon Sep 17 00:00:00 2001 From: bigtea Date: Mon, 25 Aug 2025 20:32:04 +0800 Subject: [PATCH] Fix defined name Signed-off-by: bigtea --- .../ani/accesstoken/src/ani_ability_access_ctrl.cpp | 10 +++++----- .../src/ani_request_global_switch_on_setting.cpp | 4 ++-- .../src/ani_request_permission_on_setting.cpp | 4 ++-- frameworks/ets/ani/common/include/ani_error.h | 2 +- frameworks/ets/ani/common/src/ani_error.cpp | 2 +- frameworks/ets/ani/privacy/src/privacy_manager.cpp | 6 +++--- .../src/napi_request_global_switch_on_setting.cpp | 4 ++-- .../src/napi_request_permission_on_setting.cpp | 4 ++-- .../src/request_global_switch_on_setting.cpp | 4 ++-- .../accesstoken/src/request_permission_on_setting.cpp | 4 ++-- 10 files changed, 22 insertions(+), 22 deletions(-) diff --git a/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp b/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp index 054db63f2..fc128b2dc 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp @@ -270,7 +270,7 @@ static ani_int CheckAccessTokenExecute([[maybe_unused]] ani_env* env, [[maybe_un } AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permissionName.c_str()); @@ -312,7 +312,7 @@ static void GrantUserGrantedPermissionExecute([[maybe_unused]] ani_env *env, [[m AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); uint32_t permissionFlags = static_cast(aniFlags); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName)) || (!BusinessErrorAni::ValidatePermissionFlagWithThrowError(env, permissionFlags))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) or flags(%{public}u)is invalid.", @@ -346,7 +346,7 @@ static void RevokeUserGrantedPermissionExecute([[maybe_unused]] ani_env* env, AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); uint32_t permissionFlags = static_cast(aniFlags); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName)) || (!BusinessErrorAni::ValidatePermissionFlagWithThrowError(env, permissionFlags))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) or flags(%{public}u)is invalid.", @@ -396,7 +396,7 @@ static ani_ref GetPermissionsStatusExecute([[maybe_unused]] ani_env* env, return nullptr; } AccessTokenID tokenID = static_cast(aniTokenID); - if (!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) { + if (!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) is invalid.", tokenID); return nullptr; } @@ -440,7 +440,7 @@ static ani_int GetPermissionFlagsExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermissionName)); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permissionName.c_str()); diff --git a/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp b/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp index daa13b54d..32e10fe82 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp @@ -32,7 +32,7 @@ std::shared_ptr g_requestInstanceControl = nullptr; std::mutex g_requestInstanceControlLock; // error code from dialog -constexpr int32_t REQUEST_REALDY_EXIST = 1; +constexpr int32_t REQUEST_ALREADY_EXIST = 1; constexpr int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; constexpr int32_t SWITCH_IS_ALREADY_OPEN = 3; } @@ -62,7 +62,7 @@ int32_t RequestGlobalSwitchAsyncContext::ConvertErrorCode(int32_t errCode) case RET_SUCCESS: stsCode = STS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: stsCode = STS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp b/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp index be1584694..d06444f2d 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp @@ -23,7 +23,7 @@ namespace OHOS { namespace Security { namespace AccessToken { namespace { -constexpr int32_t REQUEST_REALDY_EXIST = 1; +constexpr int32_t REQUEST_ALREADY_EXIST = 1; constexpr int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; constexpr int32_t PERM_IS_NOT_DECLARE = 3; constexpr int32_t ALL_PERM_GRANTED = 4; @@ -119,7 +119,7 @@ int32_t RequestPermOnSettingAsyncContext::ConvertErrorCode(int32_t errorCode) case RET_SUCCESS: stsCode = STS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: stsCode = STS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: diff --git a/frameworks/ets/ani/common/include/ani_error.h b/frameworks/ets/ani/common/include/ani_error.h index e47fe1133..4e1f1b60b 100644 --- a/frameworks/ets/ani/common/include/ani_error.h +++ b/frameworks/ets/ani/common/include/ani_error.h @@ -60,7 +60,7 @@ public: static void ThrowParameterTypeError(ani_env* env, int32_t err, const std::string& errMsg); static void ThrowError(ani_env* env, int32_t err, const std::string& errMsg = ""); static int32_t GetStsErrorCode(int32_t errCode); - static bool ValidateTokenIDdWithThrowError(ani_env* env, AccessTokenID tokenID); + static bool ValidateTokenIDWithThrowError(ani_env* env, AccessTokenID tokenID); static bool ValidatePermissionWithThrowError(ani_env* env, const std::string& permission); static bool ValidatePermissionFlagWithThrowError(ani_env* env, uint32_t flag); diff --git a/frameworks/ets/ani/common/src/ani_error.cpp b/frameworks/ets/ani/common/src/ani_error.cpp index f2433f1ee..d01e6bbbe 100644 --- a/frameworks/ets/ani/common/src/ani_error.cpp +++ b/frameworks/ets/ani/common/src/ani_error.cpp @@ -190,7 +190,7 @@ int32_t BusinessErrorAni::GetStsErrorCode(int32_t errCode) return stsCode; } -bool BusinessErrorAni::ValidateTokenIDdWithThrowError(ani_env* env, AccessTokenID tokenID) +bool BusinessErrorAni::ValidateTokenIDWithThrowError(ani_env* env, AccessTokenID tokenID) { if (!DataValidator::IsTokenIDValid(tokenID)) { std::string errMsg = GetErrorMessage(STS_ERROR_PARAM_INVALID, "The tokenID is 0."); diff --git a/frameworks/ets/ani/privacy/src/privacy_manager.cpp b/frameworks/ets/ani/privacy/src/privacy_manager.cpp index 008a93be6..29424fa9a 100644 --- a/frameworks/ets/ani/privacy/src/privacy_manager.cpp +++ b/frameworks/ets/ani/privacy/src/privacy_manager.cpp @@ -97,7 +97,7 @@ static void AddPermissionUsedRecordExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); @@ -477,7 +477,7 @@ static void StopUsingPermissionExecute( AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); @@ -504,7 +504,7 @@ static void StartUsingPermissionExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); diff --git a/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp b/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp index a1a525a86..1162dba5f 100644 --- a/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp +++ b/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp @@ -35,7 +35,7 @@ const std::string EXTENSION_TYPE_KEY = "ability.want.params.uiExtensionType"; const std::string UI_EXTENSION_TYPE = "sys/commonUI"; // error code from dialog -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; const int32_t SWITCH_IS_ALREADY_OPEN = 3; std::mutex g_lockFlag; @@ -47,7 +47,7 @@ static int32_t TransferToJsErrorCode(int32_t errCode) case RET_SUCCESS: jsCode = JS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: jsCode = JS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp b/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp index 3a14d93b4..20c944f7a 100644 --- a/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp +++ b/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp @@ -35,7 +35,7 @@ const std::string EXTENSION_TYPE_KEY = "ability.want.params.uiExtensionType"; const std::string UI_EXTENSION_TYPE = "sys/commonUI"; // error code from dialog -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; const int32_t PERM_IS_NOT_DECLARE = 3; const int32_t ALL_PERM_GRANTED = 4; @@ -50,7 +50,7 @@ static int32_t TransferToJsErrorCode(int32_t errCode) case RET_SUCCESS: jsCode = JS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: jsCode = JS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: diff --git a/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp b/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp index cc7e96d7b..377c4c65e 100644 --- a/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp +++ b/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp @@ -33,7 +33,7 @@ const std::string GLOBAL_SWITCH_RESULT_KEY = "ohos.user.setting.global_switch.re // error code from dialog of global switch const int32_t RET_SUCCESS = 0; -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; const int32_t SWITCH_IS_ALREADY_OPEN = 3; @@ -48,7 +48,7 @@ static int32_t TransferToCJErrorCode(int32_t errCode) case RET_SUCCESS: cjCode = CJ_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: cjCode = CJ_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp b/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp index 42d816f86..dffc68317 100644 --- a/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp +++ b/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp @@ -33,7 +33,7 @@ const std::string PERMISSION_RESULT_KEY = "ohos.user.setting.permission.result"; // error code from dialog const int32_t RET_SUCCESS = 0; -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; const int32_t PERM_IS_NOT_DECLARE = 3; const int32_t ALL_PERM_GRANTED = 4; @@ -50,7 +50,7 @@ static int32_t TransferToCJErrorCode(int32_t errCode) case RET_SUCCESS: cjCode = CJ_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: cjCode = CJ_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: -- Gitee