From 006a5b55468909e443ac4d81a9fcb48e5015a682 Mon Sep 17 00:00:00 2001 From: Chris Lu Date: Sat, 14 Feb 2026 22:12:06 -0800 Subject: [PATCH] cleanup(iam): remove temporary debug logging from STS and S3 API --- weed/s3api/s3_iam_middleware.go | 4 ---- weed/s3api/s3api_server.go | 3 --- weed/s3api/s3api_sts.go | 2 -- 3 files changed, 9 deletions(-) diff --git a/weed/s3api/s3_iam_middleware.go b/weed/s3api/s3_iam_middleware.go index c1759565d..fb0cbaa41 100644 --- a/weed/s3api/s3_iam_middleware.go +++ b/weed/s3api/s3_iam_middleware.go @@ -233,10 +233,6 @@ func (s3iam *S3IAMIntegration) ValidateSessionToken(ctx context.Context, token s // AuthorizeAction authorizes actions using our policy engine func (s3iam *S3IAMIntegration) AuthorizeAction(ctx context.Context, identity *IAMIdentity, action Action, bucket string, objectKey string, r *http.Request) s3err.ErrorCode { - fmt.Printf("DEBUG: AuthorizeAction called: Identity=%s Action=%s Bucket=%s Enabled=%v\n", identity.Name, action, bucket, s3iam.enabled) - if identity.Claims != nil { - fmt.Printf("DEBUG: AuthorizeAction Identity.Claims=%v\n", identity.Claims) - } if !s3iam.enabled { return s3err.ErrNone // Fallback to existing authorization } diff --git a/weed/s3api/s3api_server.go b/weed/s3api/s3api_server.go index 43867ceb3..abaa58797 100644 --- a/weed/s3api/s3api_server.go +++ b/weed/s3api/s3api_server.go @@ -852,11 +852,8 @@ func loadIAMManagerFromConfig(configPath string, filerAddressProvider func() str if err := json.Unmarshal(configData, &configRoot); err != nil { return nil, fmt.Errorf("failed to parse config: %w", err) } - glog.V(0).Infof("DEBUG: Loaded IAM Config. Policy=%v. Raw JSON len=%d", configRoot.Policy, len(configData)) if configRoot.Policy != nil { - glog.V(0).Infof("DEBUG: Policy Config: DefaultEffect='%s'", configRoot.Policy.DefaultEffect) } else { - glog.V(0).Infof("DEBUG: Policy Config is NIL") } // Ensure a valid policy engine config exists diff --git a/weed/s3api/s3api_sts.go b/weed/s3api/s3api_sts.go index 8f703ef42..c51168483 100644 --- a/weed/s3api/s3api_sts.go +++ b/weed/s3api/s3api_sts.go @@ -186,8 +186,6 @@ func (h *STSHandlers) handleAssumeRoleWithWebIdentity(w http.ResponseWriter, r * Policy: sessionPolicyPtr, } - glog.V(0).Infof("DEBUG: AssumeRoleWithWebIdentity: RoleArn=%s SessionPolicyLen=%d", roleArn, len(sessionPolicyJSON)) - // Call STS service response, err := h.stsService.AssumeRoleWithWebIdentity(ctx, request) if err != nil {