33 batch_processor_filter_lambda_dir = abspath (" ${ path . root } /../../lambdas/batch_processor_filter" )
44 batch_processor_filter_lambda_files = fileset (local. batch_processor_filter_lambda_dir , " **" )
55 batch_processor_filter_lambda_dir_sha = sha1 (join (" " , [for f in local . batch_processor_filter_lambda_files : filesha1 (" ${ local . batch_processor_filter_lambda_dir } /${ f } " )]))
6+ batch_processor_filter_lambda_name = " ${ local . short_prefix } -batch-processor-filter-lambda"
67}
78
89resource "aws_ecr_repository" "batch_processor_filter_lambda_repository" {
@@ -69,7 +70,7 @@ resource "aws_ecr_repository_policy" "batch_processor_filter_lambda_ECRImageRetr
6970 ],
7071 " Condition" : {
7172 " StringLike" : {
72- " aws:sourceArn" : " arn:aws:lambda:${ var . aws_region } :${ var . immunisation_account_id } :function:${ local . short_prefix } -batch-processor-filter-lambda "
73+ " aws:sourceArn" : " arn:aws:lambda:${ var . aws_region } :${ var . immunisation_account_id } :function:${ local . batch_processor_filter_lambda_name } "
7374 }
7475 }
7576 }
@@ -79,7 +80,7 @@ resource "aws_ecr_repository_policy" "batch_processor_filter_lambda_ECRImageRetr
7980
8081# IAM Role for Lambda
8182resource "aws_iam_role" "batch_processor_filter_lambda_exec_role" {
82- name = " ${ local . short_prefix } -batch-processor-filter-lambda -exec-role"
83+ name = " ${ local . batch_processor_filter_lambda_name } -exec-role"
8384 assume_role_policy = jsonencode ({
8485 Version = " 2012-10-17" ,
8586 Statement = [{
@@ -95,7 +96,7 @@ resource "aws_iam_role" "batch_processor_filter_lambda_exec_role" {
9596
9697# Policy for Lambda execution role
9798resource "aws_iam_policy" "batch_processor_filter_lambda_exec_policy" {
98- name = " ${ local . short_prefix } -batch-processor-filter-lambda -exec-policy"
99+ name = " ${ local . batch_processor_filter_lambda_name } -exec-policy"
99100 policy = jsonencode ({
100101 Version = " 2012-10-17" ,
101102 Statement = [
@@ -106,7 +107,7 @@ resource "aws_iam_policy" "batch_processor_filter_lambda_exec_policy" {
106107 " logs:CreateLogStream" ,
107108 " logs:PutLogEvents"
108109 ]
109- Resource = " arn:aws:logs:${ var . aws_region } :${ var . immunisation_account_id } :log-group:/aws/lambda/${ local . short_prefix } -batch-processor-filter-lambda :*"
110+ Resource = " arn:aws:logs:${ var . aws_region } :${ var . immunisation_account_id } :log-group:/aws/lambda/${ local . batch_processor_filter_lambda_name } :*"
110111 },
111112 {
112113 Effect = " Allow" ,
@@ -157,7 +158,7 @@ resource "aws_iam_policy" "batch_processor_filter_lambda_exec_policy" {
157158
158159# Policy for Lambda to interact with SQS
159160resource "aws_iam_policy" "batch_processor_filter_lambda_sqs_policy" {
160- name = " ${ local . short_prefix } -batch-processor-filter-lambda -sqs-policy"
161+ name = " ${ local . batch_processor_filter_lambda_name } -sqs-policy"
161162
162163 policy = jsonencode ({
163164 Version = " 2012-10-17" ,
@@ -183,7 +184,7 @@ resource "aws_iam_policy" "batch_processor_filter_lambda_sqs_policy" {
183184}
184185
185186resource "aws_iam_policy" "batch_processor_filter_lambda_kms_access_policy" {
186- name = " ${ local . short_prefix } -batch-processor-filter-lambda -kms-policy"
187+ name = " ${ local . batch_processor_filter_lambda_name } -kms-policy"
187188 description = " Allow Lambda to decrypt environment variables"
188189
189190 policy = jsonencode ({
@@ -261,7 +262,7 @@ resource "aws_iam_role_policy_attachment" "batch_processor_filter_lambda_dynamo_
261262
262263# Lambda Function with Security Group and VPC.
263264resource "aws_lambda_function" "batch_processor_filter_lambda" {
264- function_name = " ${ local . short_prefix } -batch-processor-filter-lambda "
265+ function_name = local. batch_processor_filter_lambda_name
265266 role = aws_iam_role. batch_processor_filter_lambda_exec_role . arn
266267 package_type = " Image"
267268 image_uri = module. batch_processor_filter_docker_image . image_uri
@@ -293,7 +294,7 @@ resource "aws_lambda_function" "batch_processor_filter_lambda" {
293294}
294295
295296resource "aws_cloudwatch_log_group" "batch_processor_filter_lambda_log_group" {
296- name = " /aws/lambda/${ local . short_prefix } -batch-processor-filter-lambda "
297+ name = " /aws/lambda/${ local . batch_processor_filter_lambda_name } "
297298 retention_in_days = 30
298299}
299300
@@ -322,7 +323,7 @@ resource "aws_cloudwatch_log_metric_filter" "batch_processor_filter_error_logs"
322323resource "aws_cloudwatch_metric_alarm" "batch_processor_filter_error_alarm" {
323324 count = var. error_alarm_notifications_enabled ? 1 : 0
324325
325- alarm_name = " ${ local . short_prefix } -batch-processor-filter-lambda -error"
326+ alarm_name = " ${ local . batch_processor_filter_lambda_name } -error"
326327 comparison_operator = " GreaterThanOrEqualToThreshold"
327328 evaluation_periods = 1
328329 metric_name = " ${ local . short_prefix } -BatchProcessorFilterErrorLogs"
0 commit comments