|
|
|
#!/usr/bin/env bash
|
|
|
|
# vim:ts=4:sts=4:sw=4:et
|
|
|
|
#
|
|
|
|
# Author: Hari Sekhon
|
|
|
|
# Date: 2019-12-19 11:21:30 +0000 (Thu, 19 Dec 2019)
|
|
|
|
#
|
|
|
|
# https://github.com/harisekhon/bash-tools
|
|
|
|
#
|
|
|
|
# License: see accompanying Hari Sekhon LICENSE file
|
|
|
|
#
|
|
|
|
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish
|
|
|
|
#
|
|
|
|
# https://www.linkedin.com/in/harisekhon
|
|
|
|
#
|
|
|
|
|
|
|
|
# Prints users access keys and their last used date using a credentials report (faster for many users)
|
|
|
|
#
|
|
|
|
# CSV Output format:
|
|
|
|
#
|
|
|
|
# user,access_key_1_active,access_key_1_last_used_date,access_key_2_active,access_key_2_last_used_date
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# See similar tools in DevOps Python Tools repo:
|
|
|
|
#
|
|
|
|
# https://github.com/harisekhon/devops-python-tools
|
|
|
|
|
|
|
|
set -euo pipefail
|
|
|
|
[ -n "${DEBUG:-}" ] && set -x
|
|
|
|
srcdir="$(dirname "${BASH_SOURCE[0]}")"
|
|
|
|
|
|
|
|
"$srcdir/aws_iam_generate_credentials_report_wait.sh" >&2
|
|
|
|
|
|
|
|
# use --decode not -d / -D which varies between Linux and Mac
|
|
|
|
#if [ "$(uname -s)" = Darwin ]; then
|
|
|
|
# base64_decode="base64 -D"
|
|
|
|
#else
|
|
|
|
# base64_decode="base64 -d"
|
|
|
|
#fi
|
|
|
|
|
|
|
|
aws iam get-credential-report --query 'Content' --output text |
|
|
|
|
base64 --decode |
|
|
|
|
cut -d, -f1,9,11,14,16
|