library
turbot/aws
- Associate IAM to EC2 Instance Profile
- Attach IAM Role Policy
- Change IAM User Password
- Create CloudTrail Trail
- Create CloudWatch Log Group
- Create CloudWatch Log Stream
- Create EBS Snapshot
- Create ELB Classic Load Balancer
- Create ELBv2 Load Balancer
- Create IAM Access Analyzer
- Create IAM Access Key
- Create Instance Profile
- Create IAM Policy
- Create IAM Role
- Create IAM User
- Create Lambda Function
- Create S3 Bucket
- Create SNS Topic
- Create SQS Queue
- Create VPC
- Create VPC Flow Logs
- Create VPC Security Group
- Create VPC Subnet
- Delete DynamoDB Table
- Delete EBS Snapshot
- Delete EBS Volume
- Delete EKS Node Group
- Delete ElastiCache Cluster
- Delete Elastic Load Balancer
- Delete ELB v2 Load Balancer
- Delete IAM Access Key
- Delete IAM Policy
- Delete IAM Role
- Delete IAM Server Certificate
- Delete IAM User
- Delete Lambda Function
- Delete NAT Gateway
- Delete Network ACL Entry
- Delete RDS DB Instance
- Delete Route 53 Health Check
- Delete S3 Bucket
- Delete Secrets Manager Secret
- Delete SNS Topic
- Delete SQS Queue
- Describe EBS Snapshots
- Describe EC2 Instances
- Describe IAM Instance Profile Associations
- Describe VPC Subnets
- Describe VPCs
- Detach EBS Volume
- Detach IAM User Policy
- Detach Network Interface
- Disassociate IAM Instance Profile
- Enable EBS Encryption by Default
- Enable KMS Key Rotation
- Enable Security Hub
- Get EBS Encryption by Default
- Get GuardDuty Finding
- Get Lambda Function
- Get S3 Bucket Versioning
- Get object from S3 bucket
- Get S3 Object Content
- Get S3 Public Access Block Configuration
- Get SNS Topic Attributes
- Get SQS Queue Attributes
- List GuardDuty Findings
- List IAM Access Keys
- List IAM Groups for User
- List IAM Users
- List S3 Buckets
- Modify API Gateway REST API stage
- Modify Client VPN Endpoint
- Modify EBS Snapshot
- Modify EBS Volume
- Modify EC2 Instance Attributes
- Modify EC2 Instance Metadata Options
- Modify ELB Attributes
- Modify Neptune DB Cluster
- Modify RDS DB Cluster
- Modify RDS DB Instance
- Put Alternate Contact
- Put event selectors to CloudTrail Trail
- Put IAM Role Policy
- Put KMS Key Policy
- Put S3 Bucket Encryption
- Put S3 Bucket Lifecycle policy
- Put S3 Bucket logging
- Put S3 Bucket policy
- Put S3 Public Access Block
- Put S3 Bucket Versioning
- Release VPC EIP
- Revoke VPC Security Group Ingress
- Launch EC2 Instances
- Set SNS Topic Attributes
- Set SQS Queue Attributes
- Start CloudTrail Trail logging
- Start EC2 Instances
- Stop EC2 Instances
- Subscribe to SNS Topic
- Tag Resources
- Terminate EC2 Instances
- Terminate EMR Clusters
- Test Create S3 Bucket
- Test Create SNS Topic
- Test Create SQS Queue
- Test Get Lambda Function
- Test List IAM Users
- Test Run EC2 Instance
- Test Put S3 Bucket Versioning
- Test Enable and Disable S3 Bucket Versioning
- Test Run EC2 Instance
- Test Start and Stop EC2 Instance
- Untag Resources
- Update Cloudtrail Trail
- Update DynamoDB Table Continuous Backup
- Update DynamoDB Table
- Update IAM Access Key
- Update IAM Account Password Policy
- Update Route 53 Record
Get Involved
Version
Change IAM User Password
Changes the password of the specified IAM user.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws.pipeline.change_iam_password \ --arg 'user_name=<string>' \ --arg 'old_password=<string>' \ --arg 'new_password=<string>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws.pipeline.change_iam_password args = { user_name = <string> old_password = <string> new_password = <string> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
cred | string | Yes | The name of the credential to use. | default |
user_name | string | Yes | The name of the IAM user whose password you want to change. | - |
old_password | string | Yes | The current password of the IAM user. | - |
new_password | string | Yes | The new password for the IAM user. | - |
Outputs
This pipeline has no outputs.