@@ -302,7 +302,11 @@ func providerConfigure(ctx context.Context, d *schema.ResourceData) (interface{}
302
302
}
303
303
304
304
func configureCredentialsSTS (config * Config , secret , region , awsAccessKeyID , awsSecretAccessKey , awsSessionToken , endpoint string ) (Config , error ) {
305
- ep , _ := endpoints .GetSTSRegionalEndpoint ("regional" )
305
+ ep , err := endpoints .GetSTSRegionalEndpoint ("regional" )
306
+ if err != nil {
307
+ fmt .Printf ("GetSTSRegionalEndpoint error: %s" , err )
308
+ }
309
+
306
310
sess := session .Must (session .NewSession (& aws.Config {
307
311
Region : aws .String (region ),
308
312
Credentials : credentials .NewStaticCredentials (awsAccessKeyID , awsSecretAccessKey , awsSessionToken ),
@@ -312,12 +316,18 @@ func configureCredentialsSTS(config *Config, secret, region, awsAccessKeyID, aws
312
316
313
317
creds := stscreds .NewCredentials (sess , config .AssumeRole .RoleARN )
314
318
315
- _ , _ = sess .Config .Credentials .Get ()
316
- _ , _ = creds .Get ()
319
+ _ , err = sess .Config .Credentials .Get ()
320
+ if err != nil {
321
+ fmt .Printf ("Session get credentils error: %s" , err )
322
+ }
323
+ _ , err = creds .Get ()
324
+ if err != nil {
325
+ fmt .Printf ("STS get credentials error: %s" , err )
326
+ }
317
327
secretString := secretsManagerGetSecretValue (sess , & aws.Config {Credentials : creds , Region : aws .String (region )}, secret )
318
328
319
329
var secretData SecretData
320
- err : = json .Unmarshal ([]byte (secretString ), & secretData )
330
+ err = json .Unmarshal ([]byte (secretString ), & secretData )
321
331
if err != nil {
322
332
return * config , nil
323
333
}
0 commit comments