From b6ab3cf4ba00c4b13f6a3f87b9acae3646b14ea8 Mon Sep 17 00:00:00 2001 From: Shreyas Goenka Date: Mon, 30 Dec 2024 20:20:24 +0530 Subject: [PATCH] debug logs --- bundle/config/validate/validate_artifact_path.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/bundle/config/validate/validate_artifact_path.go b/bundle/config/validate/validate_artifact_path.go index ab6c94277a..97f4166b4d 100644 --- a/bundle/config/validate/validate_artifact_path.go +++ b/bundle/config/validate/validate_artifact_path.go @@ -139,7 +139,7 @@ the artifact_path.`, // The user needs to have either WRITE_VOLUME or ALL_PRIVILEGES to write to the volume. canWrite := slices.Contains(allPrivileges, catalog.PrivilegeWriteVolume) || slices.Contains(allPrivileges, catalog.PrivilegeAllPrivileges) if !canWrite { - log.Infof(ctx, "Current privileges on Volume at artifact_path: %v", allPrivileges) + log.Debugf(ctx, "Current privileges on Volume at artifact_path: %v", allPrivileges) return wrapErrorMsg(fmt.Sprintf("user does not have WRITE_VOLUME grant on volume %s", volumeFullName)) } @@ -147,7 +147,7 @@ the artifact_path.`, // We still add this explicit check out of caution incase the API behavior changes in the future. canRead := slices.Contains(allPrivileges, catalog.PrivilegeReadVolume) || slices.Contains(allPrivileges, catalog.PrivilegeAllPrivileges) if !canRead { - log.Infof(ctx, "Current privileges on Volume at artifact_path: %v", allPrivileges) + log.Debugf(ctx, "Current privileges on Volume at artifact_path: %v", allPrivileges) return wrapErrorMsg(fmt.Sprintf("user does not have READ_VOLUME grant on volume %s", volumeFullName)) }