diff --git a/plugins/common/aws/credentials.go b/plugins/common/aws/credentials.go index 8f1697704d83b..b93932c256518 100644 --- a/plugins/common/aws/credentials.go +++ b/plugins/common/aws/credentials.go @@ -2,9 +2,6 @@ package aws import ( "context" - "fmt" - "os" - "runtime" awsV2 "github.com/aws/aws-sdk-go-v2/aws" configV2 "github.com/aws/aws-sdk-go-v2/config" @@ -28,16 +25,9 @@ type CredentialConfig struct { } func (c *CredentialConfig) Credentials() (awsV2.Config, error) { - fmt.Println(runtime.GOOS) - fmt.Println(runtime.GOARCH) - fmt.Printf("env AWS_REGION is %q\n", os.Getenv("AWS_REGION")) - fmt.Printf("setting region to: %s\n", c.Region) if c.RoleARN != "" { - fmt.Println("loading with assume credentials") - fmt.Printf("role arn: %s\n", c.RoleARN) return c.configWithAssumeCredentials() } - fmt.Println("loading with root credentials") return c.configWithRootCredentials() } @@ -60,7 +50,6 @@ func (c *CredentialConfig) configWithRootCredentials() (awsV2.Config, error) { config, err := configV2.LoadDefaultConfig(context.Background(), options...) - fmt.Printf("loaded config is using region: %s\n", config.Region) return config, err } @@ -93,7 +82,5 @@ func (c *CredentialConfig) configWithAssumeCredentials() (awsV2.Config, error) { } defaultConfig.Credentials = awsV2.NewCredentialsCache(provider) - fmt.Printf("loaded config is using region: %s\n", defaultConfig.Region) - return defaultConfig, nil }