standard
turbot/aws_compliance

Pipeline: Correct one expired IAM server certificate

Runs corrective action to delete the expired IAM server certificate.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.correct_one_iam_server_certificate_expired \
--arg 'title=<string>' \
--arg 'server_certificate_name=<string>' \
--arg 'expiration_date=<string>' \
--arg 'account_id=<string>' \
--arg 'conn=<connection.aws>'

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.correct_one_iam_server_certificate_expired
args = {
title = <string>
server_certificate_name = <string>
expiration_date = <string>
account_id = <string>
conn = <connection.aws>
}
}

Params

NameTypeRequiredDescriptionDefault
title
string
YesTitle of the resource, to be used as a display name.-
server_certificate_name
string
YesThe name of the IAM server certificate.-
expiration_date
string
YesThe expiration date of the IAM server certificate in the format YYYY-MM-DD.-
account_id
string
YesThe account ID of the AWS account.-
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.-
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
verbose, info, error
YesThe verbosity level of notification messages to send.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default
default_action
string
notify, skip, delete_expired_server_certificate
YesThe default action to use when there are no approvers.notify
enabled_actions
list(string)
skip, delete_expired_server_certificate
YesThe list of enabled actions approvers can select.
[
"skip",
"delete_expired_server_certificate"
]

Outputs

This pipeline has no outputs.

Tags

category = Compliance
folder = Internal
mod = aws
service = AWS/IAM