@@ -10,7 +10,7 @@ locals {
1010 # Calculate SHA for both directories
1111 shared_dir_sha = sha1 (join (" " , [for f in local . shared_files : filesha1 (" ${ local . shared_dir } /${ f } " )]))
1212 id_sync_lambda_dir_sha = sha1 (join (" " , [for f in local . id_sync_lambda_files : filesha1 (" ${ local . id_sync_lambda_dir } /${ f } " )]))
13-
13+ id_sync_lambda_name = " ${ local . short_prefix } -id_sync_lambda "
1414}
1515
1616resource "aws_ecr_repository" "id_sync_lambda_repository" {
@@ -173,7 +173,7 @@ resource "aws_iam_policy" "id_sync_lambda_exec_policy" {
173173 Effect = " Allow"
174174 Action = " lambda:InvokeFunction"
175175 Resource = [
176- " arn:aws:lambda:${ var . aws_region } :${ var . immunisation_account_id } :function:imms- ${ var . sub_environment } -id_sync_lambda " ,
176+ " arn:aws:lambda:${ var . aws_region } :${ var . immunisation_account_id } :function:${ local . id_sync_lambda_name } " ,
177177 ]
178178 },
179179 # NEW
@@ -270,7 +270,7 @@ resource "aws_iam_role_policy_attachment" "id_sync_lambda_dynamodb_policy_attach
270270
271271# Lambda Function with Security Group and VPC.
272272resource "aws_lambda_function" "id_sync_lambda" {
273- function_name = " ${ local . short_prefix } -id_sync_lambda "
273+ function_name = local. id_sync_lambda_name
274274 role = aws_iam_role. id_sync_lambda_exec_role . arn
275275 package_type = " Image"
276276 image_uri = module. id_sync_docker_image . image_uri
@@ -300,7 +300,7 @@ resource "aws_lambda_function" "id_sync_lambda" {
300300}
301301
302302resource "aws_cloudwatch_log_group" "id_sync_log_group" {
303- name = " /aws/lambda/${ local . short_prefix } -id_sync_lambda "
303+ name = " /aws/lambda/${ local . id_sync_lambda_name } "
304304 retention_in_days = 30
305305}
306306
0 commit comments