|
1 | 1 | locals { |
2 | | - mock_pds_lambda_dir = abspath("${path.root}/../../lambdas/mock_pds") |
3 | | - mock_pds_lambda_files = fileset(local.mock_pds_lambda_dir, "**") |
4 | | - mock_pds_lambda_dir_sha = sha1(join("", [for f in local.mock_pds_lambda_files : filesha1("${local.mock_pds_lambda_dir}/${f}")])) |
5 | | - mock_pds_lambda_name = "${local.short_prefix}-mock-pds-lambda" |
6 | | - mock_pds_base_url = var.mock_pds_enabled ? "${aws_lambda_function_url.mock_pds_lambda_url[0].function_url}Patient" : "" |
7 | | -} |
8 | | - |
9 | | -resource "aws_ecr_repository" "mock_pds_lambda_repository" { |
10 | | - count = var.mock_pds_enabled ? 1 : 0 |
11 | | - |
12 | | - image_scanning_configuration { |
13 | | - scan_on_push = true |
14 | | - } |
15 | | - |
16 | | - name = "${local.short_prefix}-mock-pds-repo" |
17 | | - force_delete = local.is_temp |
18 | | -} |
19 | | - |
20 | | -module "mock_pds_docker_image" { |
21 | | - count = var.mock_pds_enabled ? 1 : 0 |
22 | | - |
23 | | - source = "terraform-aws-modules/lambda/aws//modules/docker-build" |
24 | | - version = "8.7.0" |
25 | | - docker_file_path = "./mock_pds/Dockerfile" |
26 | | - create_ecr_repo = false |
27 | | - ecr_repo = aws_ecr_repository.mock_pds_lambda_repository[0].name |
28 | | - ecr_repo_lifecycle_policy = jsonencode({ |
29 | | - "rules" : [ |
30 | | - { |
31 | | - "rulePriority" : 1, |
32 | | - "description" : "Keep only the last 2 images", |
33 | | - "selection" : { |
34 | | - "tagStatus" : "any", |
35 | | - "countType" : "imageCountMoreThan", |
36 | | - "countNumber" : 2 |
37 | | - }, |
38 | | - "action" : { |
39 | | - "type" : "expire" |
40 | | - } |
41 | | - } |
42 | | - ] |
43 | | - }) |
44 | | - |
45 | | - platform = "linux/amd64" |
46 | | - use_image_tag = false |
47 | | - source_path = abspath("${path.root}/../../lambdas") |
48 | | - triggers = { |
49 | | - dir_sha = local.mock_pds_lambda_dir_sha |
50 | | - } |
51 | | -} |
52 | | - |
53 | | -resource "aws_ecr_repository_policy" "mock_pds_lambda_ecr_image_retrieval_policy" { |
54 | | - count = var.mock_pds_enabled ? 1 : 0 |
55 | | - |
56 | | - repository = aws_ecr_repository.mock_pds_lambda_repository[0].name |
57 | | - |
58 | | - policy = jsonencode({ |
59 | | - Version = "2012-10-17" |
60 | | - Statement = [ |
61 | | - { |
62 | | - "Sid" : "LambdaECRImageRetrievalPolicy", |
63 | | - "Effect" : "Allow", |
64 | | - "Principal" : { |
65 | | - "Service" : "lambda.amazonaws.com" |
66 | | - }, |
67 | | - "Action" : [ |
68 | | - "ecr:BatchGetImage", |
69 | | - "ecr:DeleteRepositoryPolicy", |
70 | | - "ecr:GetDownloadUrlForLayer", |
71 | | - "ecr:GetRepositoryPolicy", |
72 | | - "ecr:SetRepositoryPolicy" |
73 | | - ], |
74 | | - "Condition" : { |
75 | | - "StringLike" : { |
76 | | - "aws:sourceArn" : "arn:aws:lambda:${var.aws_region}:${var.immunisation_account_id}:function:${local.mock_pds_lambda_name}" |
77 | | - } |
78 | | - } |
79 | | - } |
80 | | - ] |
81 | | - }) |
| 2 | + mock_pds_lambda_name = "${local.short_prefix}-mock-pds-lambda" |
| 3 | + mock_pds_base_url = var.mock_pds_enabled ? "${aws_lambda_function_url.mock_pds_lambda_url[0].function_url}Patient" : "" |
82 | 4 | } |
83 | 5 |
|
84 | 6 | resource "aws_iam_role" "mock_pds_lambda_exec_role" { |
@@ -174,7 +96,7 @@ resource "aws_lambda_function" "mock_pds_lambda" { |
174 | 96 | function_name = local.mock_pds_lambda_name |
175 | 97 | role = aws_iam_role.mock_pds_lambda_exec_role[0].arn |
176 | 98 | package_type = "Image" |
177 | | - image_uri = module.mock_pds_docker_image[0].image_uri |
| 99 | + image_uri = var.mock_pds_image_uri |
178 | 100 | architectures = ["x86_64"] |
179 | 101 | timeout = 30 |
180 | 102 |
|
|
0 commit comments