Skip to content

Commit e9ba4ad

Browse files
committed
Sonar and attempt to fix tf apply in pipeline
1 parent 0782bd9 commit e9ba4ad

File tree

4 files changed

+9
-2
lines changed

4 files changed

+9
-2
lines changed

backend/src/service/fhir_service.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,6 @@ def create_immunization(self, immunization: dict, supplier_system: str) -> str:
148148
if not self.authoriser.authorise(supplier_system, ApiOperationCode.CREATE, {vaccination_type}):
149149
raise UnauthorizedVaxError()
150150

151-
# TODO - consider only using FHIR entities in service layer
152151
identifier_system = immunization["identifier"][0]["system"]
153152
identifier_value = immunization["identifier"][0]["value"]
154153

infrastructure/instance/file_name_processor.tf

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -312,6 +312,10 @@ resource "aws_s3_bucket_notification" "datasources_lambda_notification" {
312312
lambda_function_arn = aws_lambda_function.file_processor_lambda.arn
313313
events = ["s3:ObjectCreated:*"]
314314
}
315+
316+
depends_on = [
317+
aws_lambda_permission.s3_invoke_permission
318+
]
315319
}
316320

317321
resource "aws_cloudwatch_log_group" "file_name_processor_log_group" {

infrastructure/instance/mesh_processor.tf

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -244,6 +244,10 @@ resource "aws_s3_bucket_notification" "mesh_datasources_lambda_notification" {
244244
events = ["s3:ObjectCreated:*"]
245245
filter_prefix = "inbound/"
246246
}
247+
248+
depends_on = [
249+
aws_lambda_permission.mesh_s3_invoke_permission
250+
]
247251
}
248252

249253
resource "aws_cloudwatch_log_group" "mesh_file_converter_log_group" {

infrastructure/instance/redis_sync_lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ resource "aws_s3_bucket_notification" "config_lambda_notification" {
264264
}
265265

266266
depends_on = [
267-
aws_lambda_function.redis_sync_lambda
267+
aws_lambda_permission.new_s3_invoke_permission
268268
]
269269
}
270270

0 commit comments

Comments
 (0)