standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Correct expired IAM server certificates
Runs corrective action to delete the expired IAM server certificates.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.correct_iam_server_certificates_expired \ --arg 'items=<list(object({ title = string server_certificate_name = string account_id = string expiration_date = string conn = string }))>'Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.correct_iam_server_certificates_expired args = { items = <list(object({ title = string server_certificate_name = string account_id = string expiration_date = string conn = string }))> }}Params
| Name | Type | Required | Description | Default |
|---|---|---|---|---|
| items | list(object({
title = string
server_certificate_name = string
account_id = string
expiration_date = string
conn = string
})) | Yes | A collection of detected resources to run corrective actions against. | - |
| notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
| notification_level | string verbose, info, error | Yes | The verbosity level of notification messages to send. | info |
| approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
| default_action | string notify, skip, delete_expired_server_certificate | Yes | The default action to use when there are no approvers. | notify |
| enabled_actions | list(string) skip, delete_expired_server_certificate | Yes | The list of enabled actions approvers can select. | |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
mod = aws
service = AWS/IAM