diff --git a/cmd/iam.go b/cmd/iam.go index e70c99b4f..0a0e747c6 100644 --- a/cmd/iam.go +++ b/cmd/iam.go @@ -1361,7 +1361,6 @@ var iamAccountOtherAccessActions = iampolicy.NewActionSet( func (sys *IAMSys) GetAccountAccess(accountName, bucket string) (rd, wr, o bool) { policies, err := sys.PolicyDBGet(accountName, false) if err != nil { - logger.LogIf(context.Background(), err) return false, false, false } @@ -1508,7 +1507,6 @@ func (sys *IAMSys) IsAllowedServiceAccount(args iampolicy.Args, parent string) b // Check if the parent is allowed to perform this action, reject if not parentUserPolicies, err := sys.PolicyDBGet(parent, false) if err != nil { - logger.LogIf(context.Background(), err) return false } @@ -1729,7 +1727,6 @@ func (sys *IAMSys) IsAllowed(args iampolicy.Args) bool { // If the credential is temporary, perform STS related checks. ok, err := sys.IsTempUser(args.AccountName) if err != nil { - logger.LogIf(context.Background(), err) return false } if ok { @@ -1739,7 +1736,6 @@ func (sys *IAMSys) IsAllowed(args iampolicy.Args) bool { // If the credential is for a service account, perform related check ok, parentUser, err := sys.IsServiceAccount(args.AccountName) if err != nil { - logger.LogIf(context.Background(), err) return false } if ok { @@ -1749,7 +1745,6 @@ func (sys *IAMSys) IsAllowed(args iampolicy.Args) bool { // Continue with the assumption of a regular user policies, err := sys.PolicyDBGet(args.AccountName, false) if err != nil { - logger.LogIf(context.Background(), err) return false }