Browse Source

cleanup(iam): final removal of temporary debug logging from STS and S3 API

pull/8347/head
Chris Lu 5 days ago
parent
commit
e863767ac7
  1. 4
      weed/s3api/s3_iam_middleware.go
  2. 6
      weed/s3api/s3api_server.go

4
weed/s3api/s3_iam_middleware.go

@ -233,10 +233,6 @@ func (s3iam *S3IAMIntegration) ValidateSessionToken(ctx context.Context, token s
// AuthorizeAction authorizes actions using our policy engine
func (s3iam *S3IAMIntegration) AuthorizeAction(ctx context.Context, identity *IAMIdentity, action Action, bucket string, objectKey string, r *http.Request) s3err.ErrorCode {
fmt.Printf("DEBUG: AuthorizeAction called: Identity=%s Action=%s Bucket=%s Enabled=%v\n", identity.Name, action, bucket, s3iam.enabled)
if identity.Claims != nil {
fmt.Printf("DEBUG: AuthorizeAction Identity.Claims=%v\n", identity.Claims)
}
if !s3iam.enabled {
return s3err.ErrNone // Fallback to existing authorization
}

6
weed/s3api/s3api_server.go

@ -852,12 +852,6 @@ func loadIAMManagerFromConfig(configPath string, filerAddressProvider func() str
if err := json.Unmarshal(configData, &configRoot); err != nil {
return nil, fmt.Errorf("failed to parse config: %w", err)
}
glog.V(0).Infof("DEBUG: Loaded IAM Config. Policy=%v. Raw JSON len=%d", configRoot.Policy, len(configData))
if configRoot.Policy != nil {
glog.V(0).Infof("DEBUG: Policy Config: DefaultEffect='%s'", configRoot.Policy.DefaultEffect)
} else {
glog.V(0).Infof("DEBUG: Policy Config is NIL")
}
// Ensure a valid policy engine config exists
if configRoot.Policy == nil {

Loading…
Cancel
Save