qq登录成功,callback会被回调两次。
经跟踪代码得知,登录成功之后会异步调用qq的 user/get_simple_userinfo 接口,造成重复回调。
迷之回调。
具体代码:

com/avos/sns/SNSQQ.QQListener onComplete()
{

2016年2.22号有人提交过这个bug 我现在也遇到了
折腾了我一晚上 。最好尽快修复 修复完后 给个答复

你好,请贴下 bug 地址。

@Override
    void initData() {
        Log.e("i:执行", "initData: " + i);
        mMyCallback = new SNSCallback() {
            @Override
            public void done(SNSBase object, SNSException e) {
                i++;
                Log.e("i:执行", "done: " + i);
            }
        };
    }

在qq登录授权后 它回调了两遍

**02-15 11:40:42.671 15418-15418/com.yootn.code E/i:执行: initData: 0**
02-15 11:40:48.156 16573-16573/? E/memtrack: Couldn't load memtrack module (No such file or directory)
02-15 11:40:48.156 16573-16573/? E/android.os.Debug: failed to load memtrack module: -2
02-15 11:41:00.832 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D wifi -m owner --uid-owner 10096 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:00.832 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D wifi -m owner --uid-owner 10096 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:00.836 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D wifi -m owner --uid-owner 10096 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:00.836 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D wifi -m owner --uid-owner 10096 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:00.837 759-833/system_process E/PowerManagerService: open app wifi usage java.lang.IllegalStateException: command '101 firewall set_uid_fw_rule 10096 wifi allow' failed with '400 101 Firewall command failed'
02-15 11:41:00.842 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D mobile -m owner --uid-owner 10096 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:00.842 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D mobile -m owner --uid-owner 10096 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:00.849 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D mobile -m owner --uid-owner 10096 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:00.849 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D mobile -m owner --uid-owner 10096 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:00.850 759-833/system_process E/PowerManagerService: open app mobile usage java.lang.IllegalStateException: command '102 firewall set_uid_fw_rule 10096 mobile allow' failed with '400 102 Firewall command failed'
02-15 11:41:00.872 16712-16712/? E/DexLoadOat: Success
02-15 11:41:00.891 16712-16712/? E/QQAppInterface: laResult: 15, verifyResult: 15
02-15 11:41:00.926 16712-16746/? E/MPlugin: Unsupported class: com.mediatek.common.telephony.IOnlyOwnerSimSupport
02-15 11:41:01.193 16712-16785/? E/GED: Failed to get GED Log Buf, err(0)
02-15 11:41:02.430 16712-16771/? E/NativeCrypto: ssl=0xae842000 cert_verify_callback x509_store_ctx=0x98587500 arg=0x0
02-15 11:41:02.430 16712-16771/? E/NativeCrypto: ssl=0xae842000 cert_verify_callback calling verifyCertificateChain authMethod=ECDHE_RSA
02-15 11:41:09.176 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D wifi -m owner --uid-owner 10246 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:09.176 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D wifi -m owner --uid-owner 10246 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:09.181 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D wifi -m owner --uid-owner 10246 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:09.181 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D wifi -m owner --uid-owner 10246 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:09.181 759-833/system_process E/PowerManagerService: open app wifi usage java.lang.IllegalStateException: command '103 firewall set_uid_fw_rule 10246 wifi allow' failed with '400 103 Firewall command failed'
02-15 11:41:09.186 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D mobile -m owner --uid-owner 10246 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:09.186 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/iptables -D mobile -m owner --uid-owner 10246 -j REJECT --reject-with icmp-net-prohibited 
02-15 11:41:09.190 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D mobile -m owner --uid-owner 10246 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:09.190 285-823/? E/flymed: exec() res=0, status=256 for /system/bin/ip6tables -D mobile -m owner --uid-owner 10246 -j REJECT --reject-with icmp6-adm-prohibited 
02-15 11:41:09.190 759-833/system_process E/PowerManagerService: open app mobile usage java.lang.IllegalStateException: command '104 firewall set_uid_fw_rule 10246 mobile allow' failed with '400 104 Firewall command failed'
**02-15 11:41:14.012 15418-15418/com.yootn.code E/i:执行: done: 1**
02-15 11:41:16.450 15418-16900/com.yootn.code E/NativeCrypto: ssl=0xae843000 cert_verify_callback x509_store_ctx=0x9f9409d0 arg=0x0
02-15 11:41:16.450 15418-16900/com.yootn.code E/NativeCrypto: ssl=0xae843000 cert_verify_callback calling verifyCertificateChain authMethod=ECDHE_RSA
**02-15 11:41:21.808 15418-16900/com.yootn.code E/i:执行: done: 2**
1 人赞了这个帖子.