From 288388c2034ff9e4b9c11d16395264e485410322 Mon Sep 17 00:00:00 2001 From: bigtea Date: Mon, 25 Aug 2025 20:32:04 +0800 Subject: [PATCH] Fix defined name 0702 Signed-off-by: bigtea --- .../ani/accesstoken/src/ani_ability_access_ctrl.cpp | 10 +++++----- .../src/ani_request_global_switch_on_setting.cpp | 4 ++-- .../src/ani_request_permission_on_setting.cpp | 4 ++-- frameworks/ets/ani/common/include/ani_error.h | 2 +- frameworks/ets/ani/common/src/ani_error.cpp | 2 +- frameworks/ets/ani/privacy/src/privacy_manager.cpp | 6 +++--- .../src/napi_request_global_switch_on_setting.cpp | 4 ++-- .../src/napi_request_permission_on_setting.cpp | 4 ++-- .../src/request_global_switch_on_setting.cpp | 4 ++-- .../accesstoken/src/request_permission_on_setting.cpp | 4 ++-- 10 files changed, 22 insertions(+), 22 deletions(-) diff --git a/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp b/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp index 407d42c89..bb1f4841d 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_ability_access_ctrl.cpp @@ -281,7 +281,7 @@ static ani_int CheckAccessTokenExecute([[maybe_unused]] ani_env* env, [[maybe_un } AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permissionName.c_str()); @@ -323,7 +323,7 @@ static void GrantUserGrantedPermissionExecute([[maybe_unused]] ani_env *env, [[m AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); uint32_t permissionFlags = static_cast(aniFlags); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName)) || (!BusinessErrorAni::ValidatePermissionFlagWithThrowError(env, permissionFlags))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) or flags(%{public}u)is invalid.", @@ -357,7 +357,7 @@ static void RevokeUserGrantedPermissionExecute([[maybe_unused]] ani_env* env, AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermission)); uint32_t permissionFlags = static_cast(aniFlags); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName)) || (!BusinessErrorAni::ValidatePermissionFlagWithThrowError(env, permissionFlags))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) or flags(%{public}u)is invalid.", @@ -407,7 +407,7 @@ static ani_ref GetPermissionsStatusExecute([[maybe_unused]] ani_env* env, return nullptr; } AccessTokenID tokenID = static_cast(aniTokenID); - if (!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) { + if (!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) is invalid.", tokenID); return nullptr; } @@ -446,7 +446,7 @@ static ani_int GetPermissionFlagsExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permissionName = ParseAniString(env, static_cast(aniPermissionName)); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permissionName))) { LOGE(ATM_DOMAIN, ATM_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permissionName.c_str()); diff --git a/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp b/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp index 1cdeeb14e..029227118 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_request_global_switch_on_setting.cpp @@ -32,7 +32,7 @@ const std::string EXTENSION_TYPE_KEY = "ability.want.params.uiExtensionType"; const std::string UI_EXTENSION_TYPE = "sys/commonUI"; // error code from dialog -constexpr int32_t REQUEST_REALDY_EXIST = 1; +constexpr int32_t REQUEST_ALREADY_EXIST = 1; constexpr int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; constexpr int32_t SWITCH_IS_ALREADY_OPEN = 3; } @@ -126,7 +126,7 @@ static int32_t TransferToStsErrorCode(int32_t errCode) case RET_SUCCESS: stsCode = STS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: stsCode = STS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp b/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp index e65856d87..2dd690dcd 100644 --- a/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp +++ b/frameworks/ets/ani/accesstoken/src/ani_request_permission_on_setting.cpp @@ -25,7 +25,7 @@ std::map> RequestOnSettingAsyncInstanceControl::instanceIdMap_; std::mutex RequestOnSettingAsyncInstanceControl::instanceIdMutex_; namespace { -constexpr int32_t REQUEST_REALDY_EXIST = 1; +constexpr int32_t REQUEST_ALREADY_EXIST = 1; constexpr int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; constexpr int32_t PERM_IS_NOT_DECLARE = 3; constexpr int32_t ALL_PERM_GRANTED = 4; @@ -182,7 +182,7 @@ static int32_t TransferToStsErrorCode(int32_t errorCode) case RET_SUCCESS: stsCode = STS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: stsCode = STS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: diff --git a/frameworks/ets/ani/common/include/ani_error.h b/frameworks/ets/ani/common/include/ani_error.h index e47fe1133..4e1f1b60b 100644 --- a/frameworks/ets/ani/common/include/ani_error.h +++ b/frameworks/ets/ani/common/include/ani_error.h @@ -60,7 +60,7 @@ public: static void ThrowParameterTypeError(ani_env* env, int32_t err, const std::string& errMsg); static void ThrowError(ani_env* env, int32_t err, const std::string& errMsg = ""); static int32_t GetStsErrorCode(int32_t errCode); - static bool ValidateTokenIDdWithThrowError(ani_env* env, AccessTokenID tokenID); + static bool ValidateTokenIDWithThrowError(ani_env* env, AccessTokenID tokenID); static bool ValidatePermissionWithThrowError(ani_env* env, const std::string& permission); static bool ValidatePermissionFlagWithThrowError(ani_env* env, uint32_t flag); diff --git a/frameworks/ets/ani/common/src/ani_error.cpp b/frameworks/ets/ani/common/src/ani_error.cpp index 92f9bd091..ef1b95fcb 100644 --- a/frameworks/ets/ani/common/src/ani_error.cpp +++ b/frameworks/ets/ani/common/src/ani_error.cpp @@ -190,7 +190,7 @@ int32_t BusinessErrorAni::GetStsErrorCode(int32_t errCode) return stsCode; } -bool BusinessErrorAni::ValidateTokenIDdWithThrowError(ani_env* env, AccessTokenID tokenID) +bool BusinessErrorAni::ValidateTokenIDWithThrowError(ani_env* env, AccessTokenID tokenID) { if (!DataValidator::IsTokenIDValid(tokenID)) { std::string errMsg = GetErrorMessage(STS_ERROR_PARAM_INVALID, "The tokenID is 0."); diff --git a/frameworks/ets/ani/privacy/src/privacy_manager.cpp b/frameworks/ets/ani/privacy/src/privacy_manager.cpp index 50eff8881..fef3cdd49 100644 --- a/frameworks/ets/ani/privacy/src/privacy_manager.cpp +++ b/frameworks/ets/ani/privacy/src/privacy_manager.cpp @@ -97,7 +97,7 @@ static void AddPermissionUsedRecordExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); @@ -477,7 +477,7 @@ static void StopUsingPermissionExecute( AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); @@ -504,7 +504,7 @@ static void StartUsingPermissionExecute([[maybe_unused]] ani_env* env, } AccessTokenID tokenID = static_cast(aniTokenID); std::string permission = ParseAniString(env, aniPermission); - if ((!BusinessErrorAni::ValidateTokenIDdWithThrowError(env, tokenID)) || + if ((!BusinessErrorAni::ValidateTokenIDWithThrowError(env, tokenID)) || (!BusinessErrorAni::ValidatePermissionWithThrowError(env, permission))) { LOGE(PRI_DOMAIN, PRI_TAG, "TokenId(%{public}u) or Permission(%{public}s) is invalid.", tokenID, permission.c_str()); diff --git a/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp b/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp index 981c13fb2..31a850cbf 100644 --- a/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp +++ b/frameworks/js/napi/accesstoken/src/napi_request_global_switch_on_setting.cpp @@ -35,7 +35,7 @@ const std::string EXTENSION_TYPE_KEY = "ability.want.params.uiExtensionType"; const std::string UI_EXTENSION_TYPE = "sys/commonUI"; // error code from dialog -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; const int32_t SWITCH_IS_ALREADY_OPEN = 3; std::mutex g_lockFlag; @@ -47,7 +47,7 @@ static int32_t TransferToJsErrorCode(int32_t errCode) case RET_SUCCESS: jsCode = JS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: jsCode = JS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp b/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp index ed7f3282c..ecacb1687 100644 --- a/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp +++ b/frameworks/js/napi/accesstoken/src/napi_request_permission_on_setting.cpp @@ -35,7 +35,7 @@ const std::string EXTENSION_TYPE_KEY = "ability.want.params.uiExtensionType"; const std::string UI_EXTENSION_TYPE = "sys/commonUI"; // error code from dialog -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; const int32_t PERM_IS_NOT_DECLARE = 3; const int32_t ALL_PERM_GRANTED = 4; @@ -50,7 +50,7 @@ static int32_t TransferToJsErrorCode(int32_t errCode) case RET_SUCCESS: jsCode = JS_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: jsCode = JS_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: diff --git a/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp b/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp index cc7e96d7b..377c4c65e 100644 --- a/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp +++ b/interfaces/kits/cj/accesstoken/src/request_global_switch_on_setting.cpp @@ -33,7 +33,7 @@ const std::string GLOBAL_SWITCH_RESULT_KEY = "ohos.user.setting.global_switch.re // error code from dialog of global switch const int32_t RET_SUCCESS = 0; -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t GLOBAL_TYPE_IS_NOT_SUPPORT = 2; const int32_t SWITCH_IS_ALREADY_OPEN = 3; @@ -48,7 +48,7 @@ static int32_t TransferToCJErrorCode(int32_t errCode) case RET_SUCCESS: cjCode = CJ_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: cjCode = CJ_ERROR_REQUEST_IS_ALREADY_EXIST; break; case GLOBAL_TYPE_IS_NOT_SUPPORT: diff --git a/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp b/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp index 42d816f86..dffc68317 100644 --- a/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp +++ b/interfaces/kits/cj/accesstoken/src/request_permission_on_setting.cpp @@ -33,7 +33,7 @@ const std::string PERMISSION_RESULT_KEY = "ohos.user.setting.permission.result"; // error code from dialog const int32_t RET_SUCCESS = 0; -const int32_t REQUEST_REALDY_EXIST = 1; +const int32_t REQUEST_ALREADY_EXIST = 1; const int32_t PERM_NOT_BELONG_TO_SAME_GROUP = 2; const int32_t PERM_IS_NOT_DECLARE = 3; const int32_t ALL_PERM_GRANTED = 4; @@ -50,7 +50,7 @@ static int32_t TransferToCJErrorCode(int32_t errCode) case RET_SUCCESS: cjCode = CJ_OK; break; - case REQUEST_REALDY_EXIST: + case REQUEST_ALREADY_EXIST: cjCode = CJ_ERROR_REQUEST_IS_ALREADY_EXIST; break; case PERM_NOT_BELONG_TO_SAME_GROUP: -- Gitee