@@ -161,13 +161,6 @@ resource "aws_iam_policy" "filenameprocessor_lambda_exec_policy" {
161161 " firehose:PutRecordBatch"
162162 ],
163163 " Resource" : " arn:aws:firehose:*:*:deliverystream/${ module . splunk . firehose_stream_name } "
164- },
165- {
166- Effect = " Allow"
167- Action = " lambda:InvokeFunction"
168- Resource = [
169- " arn:aws:lambda:${ var . aws_region } :${ var . immunisation_account_id } :function:imms-${ var . sub_environment } -filenameproc_lambda" ,
170- ]
171164 }
172165 ]
173166 })
@@ -184,7 +177,7 @@ resource "aws_iam_policy" "filenameprocessor_lambda_sqs_policy" {
184177 Action = [
185178 " sqs:SendMessage"
186179 ],
187- Resource = aws_sqs_queue.supplier_fifo_queue .arn
180+ Resource = aws_sqs_queue.batch_file_created .arn
188181 }]
189182 })
190183}
@@ -266,6 +259,7 @@ resource "aws_iam_role_policy_attachment" "filenameprocessor_lambda_dynamo_acces
266259 role = aws_iam_role. filenameprocessor_lambda_exec_role . name
267260 policy_arn = aws_iam_policy. filenameprocessor_dynamo_access_policy . arn
268261}
262+
269263# Lambda Function with Security Group and VPC.
270264resource "aws_lambda_function" "file_processor_lambda" {
271265 function_name = " ${ local . short_prefix } -filenameproc_lambda"
@@ -284,14 +278,13 @@ resource "aws_lambda_function" "file_processor_lambda" {
284278 variables = {
285279 SOURCE_BUCKET_NAME = aws_s3_bucket.batch_data_source_bucket.bucket
286280 ACK_BUCKET_NAME = aws_s3_bucket.batch_data_destination_bucket.bucket
287- QUEUE_URL = aws_sqs_queue.supplier_fifo_queue .url
281+ QUEUE_URL = aws_sqs_queue.batch_file_created .url
288282 CONFIG_BUCKET_NAME = local.config_bucket_name
289283 REDIS_HOST = data.aws_elasticache_cluster.existing_redis.cache_nodes[0 ].address
290284 REDIS_PORT = data.aws_elasticache_cluster.existing_redis.cache_nodes[0 ].port
291285 SPLUNK_FIREHOSE_NAME = module.splunk.firehose_stream_name
292286 AUDIT_TABLE_NAME = aws_dynamodb_table.audit- table.name
293287 FILE_NAME_GSI = " filename_index"
294- FILE_NAME_PROC_LAMBDA_NAME = " imms-${ var . sub_environment } -filenameproc_lambda"
295288
296289 }
297290 }
@@ -304,7 +297,6 @@ resource "aws_lambda_function" "file_processor_lambda" {
304297
305298}
306299
307-
308300# Permission for S3 to invoke Lambda function
309301resource "aws_lambda_permission" "s3_invoke_permission" {
310302 statement_id = " AllowExecutionFromS3"
0 commit comments