diff --git a/weed/s3api/s3_iam_middleware.go b/weed/s3api/s3_iam_middleware.go index c1759565d..fb0cbaa41 100644 --- a/weed/s3api/s3_iam_middleware.go +++ b/weed/s3api/s3_iam_middleware.go @@ -233,10 +233,6 @@ func (s3iam *S3IAMIntegration) ValidateSessionToken(ctx context.Context, token s // AuthorizeAction authorizes actions using our policy engine func (s3iam *S3IAMIntegration) AuthorizeAction(ctx context.Context, identity *IAMIdentity, action Action, bucket string, objectKey string, r *http.Request) s3err.ErrorCode { - fmt.Printf("DEBUG: AuthorizeAction called: Identity=%s Action=%s Bucket=%s Enabled=%v\n", identity.Name, action, bucket, s3iam.enabled) - if identity.Claims != nil { - fmt.Printf("DEBUG: AuthorizeAction Identity.Claims=%v\n", identity.Claims) - } if !s3iam.enabled { return s3err.ErrNone // Fallback to existing authorization } diff --git a/weed/s3api/s3api_server.go b/weed/s3api/s3api_server.go index 43867ceb3..6defdbf10 100644 --- a/weed/s3api/s3api_server.go +++ b/weed/s3api/s3api_server.go @@ -852,12 +852,6 @@ func loadIAMManagerFromConfig(configPath string, filerAddressProvider func() str if err := json.Unmarshal(configData, &configRoot); err != nil { return nil, fmt.Errorf("failed to parse config: %w", err) } - glog.V(0).Infof("DEBUG: Loaded IAM Config. Policy=%v. Raw JSON len=%d", configRoot.Policy, len(configData)) - if configRoot.Policy != nil { - glog.V(0).Infof("DEBUG: Policy Config: DefaultEffect='%s'", configRoot.Policy.DefaultEffect) - } else { - glog.V(0).Infof("DEBUG: Policy Config is NIL") - } // Ensure a valid policy engine config exists if configRoot.Policy == nil {