@@ -302,7 +302,11 @@ func providerConfigure(ctx context.Context, d *schema.ResourceData) (interface{}
302302}
303303
304304func configureCredentialsSTS (config * Config , secret , region , awsAccessKeyID , awsSecretAccessKey , awsSessionToken , endpoint string ) (Config , error ) {
305- ep , _ := endpoints .GetSTSRegionalEndpoint ("regional" )
305+ ep , err := endpoints .GetSTSRegionalEndpoint ("regional" )
306+ if err != nil {
307+ fmt .Printf ("GetSTSRegionalEndpoint error: %s" , err )
308+ }
309+
306310 sess := session .Must (session .NewSession (& aws.Config {
307311 Region : aws .String (region ),
308312 Credentials : credentials .NewStaticCredentials (awsAccessKeyID , awsSecretAccessKey , awsSessionToken ),
@@ -312,12 +316,18 @@ func configureCredentialsSTS(config *Config, secret, region, awsAccessKeyID, aws
312316
313317 creds := stscreds .NewCredentials (sess , config .AssumeRole .RoleARN )
314318
315- _ , _ = sess .Config .Credentials .Get ()
316- _ , _ = creds .Get ()
319+ _ , err = sess .Config .Credentials .Get ()
320+ if err != nil {
321+ fmt .Printf ("Session get credentils error: %s" , err )
322+ }
323+ _ , err = creds .Get ()
324+ if err != nil {
325+ fmt .Printf ("STS get credentials error: %s" , err )
326+ }
317327 secretString := secretsManagerGetSecretValue (sess , & aws.Config {Credentials : creds , Region : aws .String (region )}, secret )
318328
319329 var secretData SecretData
320- err : = json .Unmarshal ([]byte (secretString ), & secretData )
330+ err = json .Unmarshal ([]byte (secretString ), & secretData )
321331 if err != nil {
322332 return * config , nil
323333 }
0 commit comments