standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Test detect and correct IAM users with inline policies
Test detect and correct IAM users with inline policies attached pipeline.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.test_detect_and_correct_iam_users_with_inline_policy_attached_delete_inline_policy }
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | connection.aws.default |
user_name | string | Yes | The name of the user. | flowpipe-user-ac58b0e2-f2ca-32b8-4200-1f03e27b6295 |
policy_name | string | Yes | The name of the inline policy. | flowpipe-policy-2a075a8f-0169-e668-acf2-50bff73a8075 |
policy_document | string | Yes | The policy document. | {"Statement":[{"Action":["logs:CreateLogStream"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailCreateLogStream2014110"},{"Action":["logs:PutLogEvents"],"Effect":"Allow","Resource":["arn:aws:logs:*"],"Sid":"AWSCloudTrailPutLogEvents20141101"}],"Version":"2012-10-17"} |
Outputs
Name | Description |
---|---|
test_results | Test results for each step. |
Tags
folder = Tests