11provider "aws" {
2- region = var. AWS_REGION
2+ region = var. aws_region
33 profile = " my-dev-profile"
44}
55
6- # Usamos el Account ID para asegurar nombres de bucket S3 únicos globalmente.
76data "aws_caller_identity" "current" {}
87
98resource "aws_s3_bucket" "terraform_state" {
10- bucket = " ${ var . PROJECT_NAME_PREFIX } -tfstate-${ data . aws_caller_identity . current . account_id } -${ var . AWS_REGION } "
9+ bucket = " ${ var . project_name_prefix } -tfstate-${ data . aws_caller_identity . current . account_id } -${ var . aws_region } "
1110
1211 tags = {
13- Name = " ${ var . PROJECT_NAME_PREFIX } -terraform-state-bucket"
12+ Name = " ${ var . project_name_prefix } -terraform-state-bucket"
1413 Environment = " TerraformBackend"
1514 ManagedBy = " Terraform"
1615 }
@@ -26,7 +25,7 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "terraform_state_e
2625 }
2726}
2827
29- # Habilitar versionado para el historial de archivos de estado
28+ # activate versioning for the state bucket
3029resource "aws_s3_bucket_versioning" "terraform_state_versioning" {
3130 bucket = aws_s3_bucket. terraform_state . id
3231 versioning_configuration {
@@ -35,17 +34,17 @@ resource "aws_s3_bucket_versioning" "terraform_state_versioning" {
3534}
3635
3736resource "aws_dynamodb_table" "terraform_locks" {
38- name = " ${ var . PROJECT_NAME_PREFIX } -terraform-lock-table"
39- billing_mode = " PAY_PER_REQUEST" # Rentable para uso infrecuente como bloqueos de TF
40- hash_key = " LockID" # La clave de partición DEBE ser "LockID"
37+ name = " ${ var . project_name_prefix } -terraform-lock-table"
38+ billing_mode = " PAY_PER_REQUEST"
39+ hash_key = " LockID"
4140
4241 attribute {
4342 name = " LockID"
4443 type = " S" # String
4544 }
4645
4746 tags = {
48- Name = " ${ var . PROJECT_NAME_PREFIX } -terraform-lock-table"
47+ Name = " ${ var . project_name_prefix } -terraform-lock-table"
4948 Environment = " TerraformBackend"
5049 ManagedBy = " Terraform"
5150 }
0 commit comments