Using terragrunt to call a module to create resources in different environment

I am having some issue with my terragrunt configuration and main.tf configuration…I am trying to call my main.tf to use its configuration to create SQS and other resources in different environment but it wont create the SQS,DeadletterQueue ,role and the required policy in my desired environment.please what I’m i doing wrong

resource "aws_iam_role" "access_role" {
  name               = "access_role"
  description        = "Role For  Access"
  assume_role_policy = data.aws_iam_policy_document.trust_relationship.json
```
```Trust relationships policy document

data "aws_iam_policy_document" "trust_relationship" {
statement {
sid     = "AllowAssumeRoleForAccess"
actions = ["sts:AssumeRole"]

principals {
  type        = "AWS"
  identifiers = [var.account_id]
}

condition {
  test     = "StringEquals"
  variable = "sts:ExternalId"

  values = [var.external_id]
}
```
```data "aws_iam_policy_document" "policy_document"{
 statement{
 actions = [
  "sqs:DeleteMessage",
  "sqs:GetQueueUrl",
  "sqs:ReceiveMessage",
  "sqs:SendMessage",
  "sqs:SetQueueAttributes"
]
effect = "Allow"
resources =[
  "${aws_sqs_queue.Trail_SQS.arn}"
]
```
```resource "aws_iam_policy" "ronix_policy" {
 name = "ronix_access_policy"
 description = "ronix policy to access SQS"
 policy      = data.aws_iam_policy_document.policy_document.json
```

}

```
resource "aws_iam_role_policy_attachment" "policy_attachment" {
  policy_arn = aws_iam_policy.policy.arn
  role       = aws_iam_role.access_role.id


```resource "aws_sqs_queue_policy" "Trail_SQS_DLQ"{
    queue_url = aws_sqs_queue.Trail_SQS_DLQ.id

    policy = <<POLICY

  "Version": "2012-10-17",
  "Id": "sqspolicy",
  "Statement": [
    {
      "Sid": "DLQ Policy",
      "Effect": "Allow",
      "Principal": {"AWS":"*"},
      "Action": "sqs:*",
      "Resource": "${aws_sqs_queue.Trail_SQS_DLQ.arn}"

```resource "aws_sqs_queue_policy" "trail_SQS_Policy" {
  queue_url = aws_sqs_queue.CloudTrail_SQS.id

  policy = <<POLICY
{
  "Version": "2012-10-17",
  "Id": "sqspolicy",
  "Statement": [
    {
      "Sid": "AllowSQSInvocation",
      "Effect": "Allow",
      "Principal": {"AWS":"*"},
      "Action": "sqs:*",
      "Resource": "${aws_sqs_queue.CloudTrail_SQS.arn}"

```output "sqs_queue_id"{
    value       =    aws_sqs_queue.Trail_SQS.id
    description = "The URL for the created Amazon SQS queue."
}

output "sqs_queue_arn" {
  value       =  aws_sqs_queue.Trail_SQS.arn
  description = "The ARN of the SQS queue."
}

output "sqs_queue_url"{
  description = "The URL for the created Amazon SQS queue"
  value       = aws_sqs_queue.Trail_SQS.url
}


~~~terraform {
         source = "../../../../..//module"
}


include {
  path = find_in_parent_folders()
}

inputs = {
  event_log_bucket_name = "trailbucket-sqs-logs"
  aws_sqs_queue_name               = "Trail_SQS"
  dead_letter_queue_name           = "Trail_SQS_DLQ"
  role_name                        = "ronix_access_role"
  description                      = "Role for ronix access"
  kms_key_arn                      = "ARN of the key"
}
}