library
turbot/aws
- Associate IAM to EC2 Instance Profile
- Attach IAM Role Policy
- Change IAM User Password
- Create CloudTrail Trail
- Create CloudWatch Log Group
- Create CloudWatch Log Stream
- Create EBS Snapshot
- Create ELB Classic Load Balancer
- Create ELBv2 Load Balancer
- Create IAM Access Analyzer
- Create IAM Access Key
- Create Instance Profile
- Create IAM Policy
- Create IAM Role
- Create IAM User
- Create Lambda Function
- Create S3 Bucket
- Create SNS Topic
- Create SQS Queue
- Create VPC
- Create VPC Flow Logs
- Create VPC Security Group
- Create VPC Subnet
- Delete DynamoDB Table
- Delete EBS Snapshot
- Delete EBS Volume
- Delete EKS Node Group
- Delete ElastiCache Cluster
- Delete Elastic Load Balancer
- Delete ELB v2 Load Balancer
- Delete IAM Access Key
- Delete IAM Policy
- Delete IAM Role
- Delete IAM Server Certificate
- Delete IAM User
- Delete Lambda Function
- Delete NAT Gateway
- Delete Network ACL Entry
- Delete RDS DB Instance
- Delete Route 53 Health Check
- Delete S3 Bucket
- Delete Secrets Manager Secret
- Delete SNS Topic
- Delete SQS Queue
- Describe EBS Snapshots
- Describe EC2 Instances
- Describe IAM Instance Profile Associations
- Describe VPC Subnets
- Describe VPCs
- Detach EBS Volume
- Detach IAM User Policy
- Detach Network Interface
- Disassociate IAM Instance Profile
- Enable EBS Encryption by Default
- Enable KMS Key Rotation
- Enable Security Hub
- Get EBS Encryption by Default
- Get GuardDuty Finding
- Get Lambda Function
- Get S3 Bucket Versioning
- Get object from S3 bucket
- Get S3 Object Content
- Get S3 Public Access Block Configuration
- Get SNS Topic Attributes
- Get SQS Queue Attributes
- List GuardDuty Findings
- List IAM Access Keys
- List IAM Groups for User
- List IAM Users
- List S3 Buckets
- Modify API Gateway REST API stage
- Modify Client VPN Endpoint
- Modify EBS Snapshot
- Modify EBS Volume
- Modify EC2 Instance Attributes
- Modify EC2 Instance Metadata Options
- Modify ELB Attributes
- Modify Neptune DB Cluster
- Modify RDS DB Cluster
- Modify RDS DB Instance
- Put Alternate Contact
- Put event selectors to CloudTrail Trail
- Put IAM Role Policy
- Put KMS Key Policy
- Put S3 Bucket Encryption
- Put S3 Bucket Lifecycle policy
- Put S3 Bucket logging
- Put S3 Bucket policy
- Put S3 Public Access Block
- Put S3 Bucket Versioning
- Release VPC EIP
- Revoke VPC Security Group Ingress
- Launch EC2 Instances
- Set SNS Topic Attributes
- Set SQS Queue Attributes
- Start CloudTrail Trail logging
- Start EC2 Instances
- Stop EC2 Instances
- Subscribe to SNS Topic
- Tag Resources
- Terminate EC2 Instances
- Terminate EMR Clusters
- Test Create S3 Bucket
- Test Create SNS Topic
- Test Create SQS Queue
- Test Get Lambda Function
- Test List IAM Users
- Test Run EC2 Instance
- Test Put S3 Bucket Versioning
- Test Enable and Disable S3 Bucket Versioning
- Test Run EC2 Instance
- Test Start and Stop EC2 Instance
- Untag Resources
- Update Cloudtrail Trail
- Update DynamoDB Table Continuous Backup
- Update DynamoDB Table
- Update IAM Access Key
- Update IAM Account Password Policy
- Update Route 53 Record
Get Involved
Version
List IAM Users
Lists the IAM users that have the specified path prefix. If no path prefix is specified, the operation returns all users in the Amazon Web Services account.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws.pipeline.list_iam_users
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws.pipeline.list_iam_users }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
cred | string | Yes | Name for credentials to use. If not provided, the default credentials will be used. | default |
path_prefix | string | No | The path prefix for filtering the results. For example: /division_abc/subdivision_xyz/ , which would get all user names whose path starts with /division_abc/subdivision_xyz/ . | - |
Outputs
Name | Description |
---|---|
users | A list of users. |