diff --git a/iac/roots/athena/backend.tf b/iac/roots/athena/backend.tf index de10cb0..0ab8985 100644 --- a/iac/roots/athena/backend.tf +++ b/iac/roots/athena/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/athena/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/athena/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing-cur/backend.tf b/iac/roots/datalakes/billing-cur/backend.tf index d699695..4a058db 100644 --- a/iac/roots/datalakes/billing-cur/backend.tf +++ b/iac/roots/datalakes/billing-cur/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/billing-cur/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/billing-cur/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing/backend.tf b/iac/roots/datalakes/billing/backend.tf index e09b5a8..e40988a 100644 --- a/iac/roots/datalakes/billing/backend.tf +++ b/iac/roots/datalakes/billing/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/billing/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/billing/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/inventory/backend.tf b/iac/roots/datalakes/inventory/backend.tf index 6ea1399..a4fa74e 100644 --- a/iac/roots/datalakes/inventory/backend.tf +++ b/iac/roots/datalakes/inventory/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/inventory/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/inventory/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/splunk/backend.tf b/iac/roots/datalakes/splunk/backend.tf index dd7198a..fc94d1e 100644 --- a/iac/roots/datalakes/splunk/backend.tf +++ b/iac/roots/datalakes/splunk/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/splunk/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/splunk/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-consumer-project/backend.tf b/iac/roots/datazone/dz-consumer-project/backend.tf index e657ede..217105f 100644 --- a/iac/roots/datazone/dz-consumer-project/backend.tf +++ b/iac/roots/datazone/dz-consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-custom-project/backend.tf b/iac/roots/datazone/dz-custom-project/backend.tf index 9eec9dc..ac363b0 100644 --- a/iac/roots/datazone/dz-custom-project/backend.tf +++ b/iac/roots/datazone/dz-custom-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-domain/backend.tf b/iac/roots/datazone/dz-domain/backend.tf index 6763f0b..44cca14 100644 --- a/iac/roots/datazone/dz-domain/backend.tf +++ b/iac/roots/datazone/dz-domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-producer-project/backend.tf b/iac/roots/datazone/dz-producer-project/backend.tf index 44e33f3..8022ad6 100644 --- a/iac/roots/datazone/dz-producer-project/backend.tf +++ b/iac/roots/datazone/dz-producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-project-prereq/backend.tf b/iac/roots/datazone/dz-project-prereq/backend.tf index 8540f85..55cc8b6 100644 --- a/iac/roots/datazone/dz-project-prereq/backend.tf +++ b/iac/roots/datazone/dz-project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/buckets/backend.tf b/iac/roots/foundation/buckets/backend.tf index f5a060c..5008f2a 100644 --- a/iac/roots/foundation/buckets/backend.tf +++ b/iac/roots/foundation/buckets/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/buckets/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/buckets/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/iam-roles/backend.tf b/iac/roots/foundation/iam-roles/backend.tf index 5cddb38..0e83e17 100644 --- a/iac/roots/foundation/iam-roles/backend.tf +++ b/iac/roots/foundation/iam-roles/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/iam-roles/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/iam-roles/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/kms-keys/backend.tf b/iac/roots/foundation/kms-keys/backend.tf index 09850e9..64ad119 100644 --- a/iac/roots/foundation/kms-keys/backend.tf +++ b/iac/roots/foundation/kms-keys/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/kms-keys/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/kms-keys/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/idc/idc-acc/backend.tf b/iac/roots/idc/idc-acc/backend.tf index bbe0604..042d5b7 100644 --- a/iac/roots/idc/idc-acc/backend.tf +++ b/iac/roots/idc/idc-acc/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-acc/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-acc/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/idc/idc-org/backend.tf b/iac/roots/idc/idc-org/backend.tf index a55bbce..a1b251e 100644 --- a/iac/roots/idc/idc-org/backend.tf +++ b/iac/roots/idc/idc-org/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-org/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-org/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/network/backend.tf b/iac/roots/network/backend.tf index 5347af2..1c5ca94 100644 --- a/iac/roots/network/backend.tf +++ b/iac/roots/network/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/network/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/network/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/dataset/backend.tf b/iac/roots/quicksight/dataset/backend.tf index 03479c0..5dcdc24 100644 --- a/iac/roots/quicksight/dataset/backend.tf +++ b/iac/roots/quicksight/dataset/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dataset/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dataset/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/subscription/backend.tf b/iac/roots/quicksight/subscription/backend.tf index 0c143b6..3a0f2e2 100644 --- a/iac/roots/quicksight/subscription/backend.tf +++ b/iac/roots/quicksight/subscription/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/subscription/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/subscription/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/consumer-project/backend.tf b/iac/roots/sagemaker/consumer-project/backend.tf index fb1a7c1..54d3fea 100644 --- a/iac/roots/sagemaker/consumer-project/backend.tf +++ b/iac/roots/sagemaker/consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain-prereq/backend.tf b/iac/roots/sagemaker/domain-prereq/backend.tf index b3e796a..f9ae286 100644 --- a/iac/roots/sagemaker/domain-prereq/backend.tf +++ b/iac/roots/sagemaker/domain-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/domain-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/domain-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain/backend.tf b/iac/roots/sagemaker/domain/backend.tf index a09dbbc..b610a23 100644 --- a/iac/roots/sagemaker/domain/backend.tf +++ b/iac/roots/sagemaker/domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/producer-project/backend.tf b/iac/roots/sagemaker/producer-project/backend.tf index 6334e71..9240ad2 100644 --- a/iac/roots/sagemaker/producer-project/backend.tf +++ b/iac/roots/sagemaker/producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-config/backend.tf b/iac/roots/sagemaker/project-config/backend.tf index 7a37293..011278e 100644 --- a/iac/roots/sagemaker/project-config/backend.tf +++ b/iac/roots/sagemaker/project-config/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-config/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-config/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-prereq/backend.tf b/iac/roots/sagemaker/project-prereq/backend.tf index 87df811..f670939 100644 --- a/iac/roots/sagemaker/project-prereq/backend.tf +++ b/iac/roots/sagemaker/project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-user/backend.tf b/iac/roots/sagemaker/project-user/backend.tf index d3d9e38..8d3656f 100644 --- a/iac/roots/sagemaker/project-user/backend.tf +++ b/iac/roots/sagemaker/project-user/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-user/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-user/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } }