Creating, Building and Invoking a Function on OCI with Terraform

Lucas Jellema

Automation through infrastructure as code is the name of the game. And I am a player in that game. In the last few weeks I have spent a lot of time on creating resources on Oracle Cloud Infrastructure. Through the console, using Terraform and the Resource Manager and Stacks, with the CLI and with the OCI DevOps Build and Deployment Pipelines.

I am trying to use Terraform more and more. Using the console for the initial creation perhaps – then using Resource Discovery with the OCI Provider for Terraform (see for example this article) or the Stack export option in the OCI Console for create the Terraform plan files for the resources I just created and from that point on continuing with those plan files and the command line – typically OCI Cloud Shell with Terraform preinstalled and configured.

It seemed to me a good idea to start building a collection of Terraform plan files for common constellations of resources. And I am well aware that I am far from the first to create such a collection. I will happily use similar offerings from my friends and peers. And I will add some composites that are not yet available (or at least I did not find or like them).

In this article I will introduce the GitHub repo: in which I want to collect my handy reusable plan files.

And I am happy to share with you my first and so far my only OCI composite: Create, Build and Invoke a Function. Functions on OCI are based on the Project Fn framework. They are created as container images that are pushed to the OCI Container Registry. A function is created in an application with a reference to the container image that provides the implementation.



In my first little collection of plan files, a function’s container image is built from the sources included in the repository (a Python function that does very little). This is just an example of course and you can easily replace these sources with real ones. The container image is pushed to OCI Container Image Registry to a repository that is created by these plans specifically for the function. The function itself is subsequently created in the context of an application that already exists. The name of application as well as the name of the function are defined in the file – as are the region, the tenancy_ocid, the target compartment ocid, the Docker Registry credentials and the test request with which the function is to be invoked.

Use this sample set of Terraform plans to create your own plans. Some “tricks” in these plans:

  • use data sources to query existing OCI resources, such as the application based on its name (in
  • use local variables derived from data source results as well as input variables
  • use provisioner “local-exec” to execute Linux Bash Shell command on the server running Terraform (to interact with fn and terraform tools)
  • use Terraform function tomap() to create a key-value map structure (or JSON object) for one of the complex properties
  • use Terraform output to report on what is going on or went on (like a console.log or a dbms_output.put_line or System.out.println )
  • use resource “time_sleep” to introduce a little wait (10 seconds), in this case between creating and invoking the function (without the wait time, I ran into 404-NotAuthorizedOrNotFound  errors)

The most important Terraform resources in these plans are shown here:

The final output from running terraform apply:


It reports 7 resources added. That may be including a function call as a resource. The actual results from these plans that form the composite:

  • Container Image Registry Repository
  • Container Image for the new function (built from the Python sources)
  • Function based on Container Image added to existing application

A test call has been made to the newly created function, and it has successfully returned a response.

A next step would be to create as a Terraform composite the plans to create a DevOps Build and Deployment Pipeline for this function – in an existing DevOps project with an existing DevOps Code Repository that will trigger the Build Pipeline.


Oracle Terraform Modules – 

Terraform on OCI – articles by That Finnish Guy (Simo Vilmunen) : 

Terraform docs on Sleep –

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Next Post

VS Code Extension–GistPad–for quick gist creation, editing and consumption

Gists are the code snippets that you want to retain and share – with yourself and with others. Gists can be embedded in websites, blog articles and articles on Medium. Although used for snippets, all Gists are Git repositories, so they are automatically versioned, forkable and usable from Git. A […]
%d bloggers like this: