diff --git a/infra/main.tf b/infra/main.tf index a08c576..4168175 100644 --- a/infra/main.tf +++ b/infra/main.tf @@ -42,10 +42,8 @@ resource "aws_s3_bucket_public_access_block" "website" { depends_on = [aws_s3_bucket.website] } - resource "aws_s3_bucket_policy" "website" { bucket = aws_s3_bucket.website.id - policy = jsonencode({ Version = "2012-10-17" Statement = [ @@ -153,7 +151,7 @@ resource "aws_lambda_permission" "apigw_lambda" { resource "aws_lambda_layer_version" "test_lambda_layer" { filename = "make_lamda_layer/python.zip" layer_name = "test_lambda_layer" - compatible_runtimes = ["python3.8", "python3.7"] + compatible_runtimes = ["python3.11", "python3.7"] } resource "aws_lambda_function" "lambda" { @@ -162,7 +160,7 @@ resource "aws_lambda_function" "lambda" { role = data.aws_iam_role.role.arn handler = "lambda.register_handler" source_code_hash = data.archive_file.lambda_zip.output_base64sha256 - runtime = "python3.8" + runtime = "python3.11" timeout = 10 layers = [aws_lambda_layer_version.test_lambda_layer.arn] //lambda_layer here is the name depends_on = [aws_lambda_layer_version.test_lambda_layer] @@ -191,7 +189,7 @@ resource "aws_lambda_function" "scan" { role = data.aws_iam_role.role.arn handler = "lambda.scan_handler" source_code_hash = data.archive_file.lambda_zip.output_base64sha256 - runtime = "python3.8" + runtime = "python3.11" timeout = 900 environment { diff --git a/requirements.txt b/requirements.txt index cbcf5f1..6b1ca54 100644 --- a/requirements.txt +++ b/requirements.txt @@ -12,4 +12,4 @@ selenium-wire==4.2.0 certifi>=2023.7.22 # not directly required, pinned by Snyk to avoid a vulnerability requests>=2.32.2 # not directly required, pinned by Snyk to avoid a vulnerability urllib3>=2.2.2 # not directly required, pinned by Snyk to avoid a vulnerability -Werkzeug==2.1.2 +Werkzeug==2.1.2 \ No newline at end of file