Skip to content

Commit 59ebb83

Browse files
rabbitmq_aws: drop trailing dot in some log messages
1 parent 4d96d40 commit 59ebb83

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

deps/rabbitmq_aws/src/rabbitmq_aws.erl

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ refresh_credentials() ->
8585
refresh_credentials(State) ->
8686
rabbit_log:debug("Refreshing AWS credentials..."),
8787
{_, NewState} = load_credentials(State),
88-
rabbit_log:debug("AWS credentials have been refreshed."),
88+
rabbit_log:debug("AWS credentials have been refreshed"),
8989
set_credentials(NewState).
9090

9191

@@ -334,7 +334,7 @@ load_credentials(#state{region = Region}) ->
334334
security_token = SecurityToken,
335335
imdsv2_token = undefined}};
336336
{error, Reason} ->
337-
error_logger:error_msg("Could not load AWS credentials from environment variables, AWS_CONFIG_FILE, AWS_SHARED_CREDENTIALS_FILE or EC2 metadata endpoint: ~p. Will depend on config settings to be set.~n.", [Reason]),
337+
error_logger:error_msg("Could not load AWS credentials from environment variables, AWS_CONFIG_FILE, AWS_SHARED_CREDENTIALS_FILE or EC2 metadata endpoint: ~p. Will depend on config settings to be set~n", [Reason]),
338338
{error, #state{region = Region,
339339
error = Reason,
340340
access_key = undefined,
@@ -497,10 +497,10 @@ sign_headers(#state{access_key = AccessKey,
497497
%% @doc Determine whether or not an Imdsv2Token has expired.
498498
%% @end
499499
expired_imdsv2_token(undefined) ->
500-
rabbit_log:debug("EC2 IMDSv2 token has not yet been obtained."),
500+
rabbit_log:debug("EC2 IMDSv2 token has not yet been obtained"),
501501
true;
502502
expired_imdsv2_token({_, _, undefined}) ->
503-
rabbit_log:debug("EC2 IMDSv2 token is not available."),
503+
rabbit_log:debug("EC2 IMDSv2 token is not available"),
504504
true;
505505
expired_imdsv2_token({_, _, Expiration}) ->
506506
Now = calendar:datetime_to_gregorian_seconds(local_time()),
@@ -527,7 +527,7 @@ ensure_imdsv2_token_valid() ->
527527
%% If the credentials are not available or have expired, then refresh them before performing the request.
528528
%% @end
529529
ensure_credentials_valid() ->
530-
rabbit_log:debug("Making sure AWS credentials are available and still valid."),
530+
rabbit_log:debug("Making sure AWS credentials are available and still valid"),
531531
{ok, State} = gen_server:call(rabbitmq_aws, get_state),
532532
case has_credentials(State) of
533533
true -> case expired_credentials(State#state.expiration) of

0 commit comments

Comments
 (0)