diff --git a/route53-zone-association/vpc/README.md b/route53-zone-association/vpc/README.md
index fa5e28b..5a3ff70 100644
--- a/route53-zone-association/vpc/README.md
+++ b/route53-zone-association/vpc/README.md
@@ -56,7 +56,7 @@ No modules.
| [account\_id](#input\_account\_id) | AWS Account ID (default: will pull from current user) | `string` | `""` | no |
| [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no |
| [private\_zone](#input\_private\_zone) | Selection either private or public (default: private) for named zones | `bool` | `true` | no |
-| [region](#input\_region) | AWS Region to select for peer (default: from provider aws.peer) | `string` | `null` | no |
+| [region](#input\_region) | AWS Region to select for self (default: from provider aws.self) | `string` | `null` | no |
| [tags](#input\_tags) | AWS Tags to apply to appropriate resources (S3, KMS). Do not include safeguard tags here, use the data\_safeguard field for such things. | `map(string)` | `{}` | no |
| [vpc\_id](#input\_vpc\_id) | VPC ID with which to associate Route53 PHZs | `string` | n/a | yes |
| [zone\_ids](#input\_zone\_ids) | List of Route53 PHZ IDs to associate with a (local/remote) VPC | `list(string)` | `[]` | no |
diff --git a/route53-zone-association/vpc/main.tf b/route53-zone-association/vpc/main.tf
index f2e13b8..1643f48 100644
--- a/route53-zone-association/vpc/main.tf
+++ b/route53-zone-association/vpc/main.tf
@@ -24,7 +24,7 @@ resource "aws_route53_vpc_association_authorization" "peer_zone" {
provider = aws.peer
for_each = data.aws_caller_identity.self.account_id != data.aws_caller_identity.peer.account_id ? toset(var.zone_ids) : toset([])
zone_id = each.key
- vpc_region = var.region == null ? data.aws_region.peer.name : var.region
+ vpc_region = var.region == null ? data.aws_region.self.name : var.region
vpc_id = var.vpc_id
}
@@ -34,7 +34,7 @@ resource "aws_route53_zone_association" "peer_zone" {
zone_id = each.key
vpc_id = var.vpc_id
- vpc_region = data.aws_region.self.name
+ vpc_region = var.region == null ? data.aws_region.self.name : var.region
depends_on = [aws_route53_vpc_association_authorization.peer_zone]
}
@@ -56,7 +56,7 @@ resource "aws_route53_vpc_association_authorization" "peer_zones" {
provider = aws.peer
for_each = data.aws_caller_identity.self.account_id != data.aws_caller_identity.peer.account_id ? toset(local.zones_ids) : toset([])
zone_id = each.key
- vpc_region = var.region == null ? data.aws_region.peer.name : var.region
+ vpc_region = var.region == null ? data.aws_region.self.name : var.region
vpc_id = var.vpc_id
}
@@ -66,7 +66,7 @@ resource "aws_route53_zone_association" "peer_zones" {
zone_id = each.key
vpc_id = var.vpc_id
- vpc_region = data.aws_region.self.name
+ vpc_region = var.region == null ? data.aws_region.self.name : var.region
depends_on = [aws_route53_vpc_association_authorization.peer_zones]
}
diff --git a/route53-zone-association/vpc/variables.tf b/route53-zone-association/vpc/variables.tf
index f94866f..9dcd809 100644
--- a/route53-zone-association/vpc/variables.tf
+++ b/route53-zone-association/vpc/variables.tf
@@ -22,7 +22,7 @@ variable "private_zone" {
}
variable "region" {
- description = "AWS Region to select for peer (default: from provider aws.peer)"
+ description = "AWS Region to select for self (default: from provider aws.self)"
type = string
default = null
}