From db59331c3e0134f584a6a46c660e42161bf3a194 Mon Sep 17 00:00:00 2001 From: badra001 Date: Tue, 28 Mar 2023 20:02:33 -0400 Subject: [PATCH] update --- route53-zone-association/vpc/README.md | 2 +- route53-zone-association/vpc/main.tf | 8 ++++---- route53-zone-association/vpc/variables.tf | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/route53-zone-association/vpc/README.md b/route53-zone-association/vpc/README.md index fa5e28b..5a3ff70 100644 --- a/route53-zone-association/vpc/README.md +++ b/route53-zone-association/vpc/README.md @@ -56,7 +56,7 @@ No modules. | [account\_id](#input\_account\_id) | AWS Account ID (default: will pull from current user) | `string` | `""` | no | | [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no | | [private\_zone](#input\_private\_zone) | Selection either private or public (default: private) for named zones | `bool` | `true` | no | -| [region](#input\_region) | AWS Region to select for peer (default: from provider aws.peer) | `string` | `null` | no | +| [region](#input\_region) | AWS Region to select for self (default: from provider aws.self) | `string` | `null` | no | | [tags](#input\_tags) | AWS Tags to apply to appropriate resources (S3, KMS). Do not include safeguard tags here, use the data\_safeguard field for such things. | `map(string)` | `{}` | no | | [vpc\_id](#input\_vpc\_id) | VPC ID with which to associate Route53 PHZs | `string` | n/a | yes | | [zone\_ids](#input\_zone\_ids) | List of Route53 PHZ IDs to associate with a (local/remote) VPC | `list(string)` | `[]` | no | diff --git a/route53-zone-association/vpc/main.tf b/route53-zone-association/vpc/main.tf index f2e13b8..1643f48 100644 --- a/route53-zone-association/vpc/main.tf +++ b/route53-zone-association/vpc/main.tf @@ -24,7 +24,7 @@ resource "aws_route53_vpc_association_authorization" "peer_zone" { provider = aws.peer for_each = data.aws_caller_identity.self.account_id != data.aws_caller_identity.peer.account_id ? toset(var.zone_ids) : toset([]) zone_id = each.key - vpc_region = var.region == null ? data.aws_region.peer.name : var.region + vpc_region = var.region == null ? data.aws_region.self.name : var.region vpc_id = var.vpc_id } @@ -34,7 +34,7 @@ resource "aws_route53_zone_association" "peer_zone" { zone_id = each.key vpc_id = var.vpc_id - vpc_region = data.aws_region.self.name + vpc_region = var.region == null ? data.aws_region.self.name : var.region depends_on = [aws_route53_vpc_association_authorization.peer_zone] } @@ -56,7 +56,7 @@ resource "aws_route53_vpc_association_authorization" "peer_zones" { provider = aws.peer for_each = data.aws_caller_identity.self.account_id != data.aws_caller_identity.peer.account_id ? toset(local.zones_ids) : toset([]) zone_id = each.key - vpc_region = var.region == null ? data.aws_region.peer.name : var.region + vpc_region = var.region == null ? data.aws_region.self.name : var.region vpc_id = var.vpc_id } @@ -66,7 +66,7 @@ resource "aws_route53_zone_association" "peer_zones" { zone_id = each.key vpc_id = var.vpc_id - vpc_region = data.aws_region.self.name + vpc_region = var.region == null ? data.aws_region.self.name : var.region depends_on = [aws_route53_vpc_association_authorization.peer_zones] } diff --git a/route53-zone-association/vpc/variables.tf b/route53-zone-association/vpc/variables.tf index f94866f..9dcd809 100644 --- a/route53-zone-association/vpc/variables.tf +++ b/route53-zone-association/vpc/variables.tf @@ -22,7 +22,7 @@ variable "private_zone" { } variable "region" { - description = "AWS Region to select for peer (default: from provider aws.peer)" + description = "AWS Region to select for self (default: from provider aws.self)" type = string default = null }