This is an automated email from the ASF dual-hosted git repository.

nvazquez pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cloudstack.git


The following commit(s) were added to refs/heads/main by this push:
     new 47a6b7011d7 Fix build
47a6b7011d7 is described below

commit 47a6b7011d7e42be86a748af50b87633147b5a90
Author: nvazquez <nicovazque...@gmail.com>
AuthorDate: Tue Aug 6 13:03:31 2024 -0300

    Fix build
---
 server/src/main/java/com/cloud/acl/DomainChecker.java       | 8 ++++----
 server/src/main/java/com/cloud/user/AccountManagerImpl.java | 2 +-
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/server/src/main/java/com/cloud/acl/DomainChecker.java 
b/server/src/main/java/com/cloud/acl/DomainChecker.java
index b81a3e57ad0..e9f60ea7aa1 100644
--- a/server/src/main/java/com/cloud/acl/DomainChecker.java
+++ b/server/src/main/java/com/cloud/acl/DomainChecker.java
@@ -234,7 +234,7 @@ public class DomainChecker extends AdapterBase implements 
SecurityChecker {
 
         Account owner = _accountDao.findById(entity.getAccountId());
         if (owner == null) {
-            s_logger.error(String.format("Owner not found for %s", entityLog));
+            logger.error(String.format("Owner not found for %s", entityLog));
             throw exception;
         }
 
@@ -248,12 +248,12 @@ public class DomainChecker extends AdapterBase implements 
SecurityChecker {
             // only project owner can delete/modify the project
             if (accessType == AccessType.ModifyProject) {
                 if (!_projectMgr.canModifyProjectAccount(caller, 
owner.getId())) {
-                    s_logger.error(String.format("Caller ID: %d does not have 
permission to modify project with " +
+                    logger.error(String.format("Caller ID: %d does not have 
permission to modify project with " +
                             "owner ID: %d", caller.getId(), owner.getId()));
                     throw exception;
                 }
             } else if (!_projectMgr.canAccessProjectAccount(caller, 
owner.getId())) {
-                s_logger.error(String.format("Caller ID: %d does not have 
permission to access project with " +
+                logger.error(String.format("Caller ID: %d does not have 
permission to access project with " +
                         "owner ID: %d", caller.getId(), owner.getId()));
                 throw exception;
             }
@@ -261,7 +261,7 @@ public class DomainChecker extends AdapterBase implements 
SecurityChecker {
             return;
         }
 
-        s_logger.error(String.format("Caller ID: %d does not have permission 
to access %s", caller.getId(), entityLog));
+        logger.error(String.format("Caller ID: %d does not have permission to 
access %s", caller.getId(), entityLog));
         throw exception;
     }
 
diff --git a/server/src/main/java/com/cloud/user/AccountManagerImpl.java 
b/server/src/main/java/com/cloud/user/AccountManagerImpl.java
index a5a1b7aae69..dcb12cbdb74 100644
--- a/server/src/main/java/com/cloud/user/AccountManagerImpl.java
+++ b/server/src/main/java/com/cloud/user/AccountManagerImpl.java
@@ -2783,7 +2783,7 @@ public class AccountManagerImpl extends ManagerBase 
implements AccountManager, M
     protected void preventRootDomainAdminAccessToRootAdminKeys(User caller, 
ControlledEntity account) {
         if (isDomainAdminForRootDomain(caller) && 
isRootAdmin(account.getAccountId())) {
             String msg = String.format("Caller Username %s does not have 
access to root admin keys", caller.getUsername());
-            s_logger.error(msg);
+            logger.error(msg);
             throw new PermissionDeniedException(msg);
         }
     }

Reply via email to