@@ -137,7 +137,7 @@ func sessionForRegionV2(region string) (*awsv2.Config, throttle.ServiceLimiters,
137137 return & ns , sl , nil
138138}
139139
140- func sessionForClusterWithRegion (k8sClient client.Client , clusterScoper cloud.SessionMetadata , region string , endpoint []ServiceEndpoint , log logger.Wrapper ) (* session. Session , throttle.ServiceLimiters , error ) {
140+ func sessionForClusterWithRegion (k8sClient client.Client , clusterScoper cloud.SessionMetadata , region string , endpoint []ServiceEndpoint , log logger.Wrapper ) (throttle.ServiceLimiters , error ) {
141141 log = log .WithName ("identity" )
142142 log .Trace ("Creating an AWS Session" )
143143
@@ -157,7 +157,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
157157 if err != nil {
158158 // could not get providers and retrieve the credentials
159159 conditions .MarkFalse (clusterScoper .InfraCluster (), infrav1 .PrincipalCredentialRetrievedCondition , infrav1 .PrincipalCredentialRetrievalFailedReason , clusterv1 .ConditionSeverityError , "%s" , err .Error ())
160- return nil , nil , errors .Wrap (err , "Failed to get providers for cluster" )
160+ return nil , errors .Wrap (err , "Failed to get providers for cluster" )
161161 }
162162
163163 isChanged := false
@@ -166,7 +166,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
166166 // load an existing matching providers from the cache if such a providers exists
167167 providerHash , err := provider .Hash ()
168168 if err != nil {
169- return nil , nil , errors .Wrap (err , "Failed to calculate provider hash" )
169+ return nil , errors .Wrap (err , "Failed to calculate provider hash" )
170170 }
171171 cachedProvider , ok := providerCache .Load (providerHash )
172172 if ok {
@@ -182,7 +182,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
182182 if ! isChanged {
183183 if s , ok := sessionCache .Load (getSessionName (region , clusterScoper )); ok {
184184 entry := s .(* sessionCacheEntry )
185- return entry .session , entry . serviceLimiters , nil
185+ return entry .serviceLimiters , nil
186186 }
187187 }
188188 awsConfig := & aws.Config {
@@ -199,7 +199,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
199199 // delete the existing session from cache. Otherwise, we give back a defective session on next method invocation with same cluster scope
200200 sessionCache .Delete (getSessionName (region , clusterScoper ))
201201
202- return nil , nil , errors .Wrap (err , "Failed to retrieve identity credentials" )
202+ return nil , errors .Wrap (err , "Failed to retrieve identity credentials" )
203203 }
204204 awsConfig = awsConfig .WithCredentials (credentials .NewChainCredentials (awsProviders ))
205205 }
@@ -208,7 +208,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
208208
209209 ns , err := session .NewSession (awsConfig )
210210 if err != nil {
211- return nil , nil , errors .Wrap (err , "Failed to create a new AWS session" )
211+ return nil , errors .Wrap (err , "Failed to create a new AWS session" )
212212 }
213213 sl := newServiceLimiters ()
214214 sessionCache .Store (getSessionName (region , clusterScoper ), & sessionCacheEntry {
@@ -217,7 +217,7 @@ func sessionForClusterWithRegion(k8sClient client.Client, clusterScoper cloud.Se
217217 sessionV2 : nil ,
218218 })
219219
220- return ns , sl , nil
220+ return sl , nil
221221}
222222
223223func sessionForClusterWithRegionV2 (k8sClient client.Client , clusterScoper cloud.SessionMetadata , region string , _ []ServiceEndpoint , log logger.Wrapper ) (* awsv2.Config , throttle.ServiceLimiters , error ) {
0 commit comments