You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
DevOps-Bash-tools/aws_iam_policy_attachments.sh

60 lines
1.6 KiB
Bash

#!/usr/bin/env bash
# vim:ts=4:sts=4:sw=4:et
#
# Author: Hari Sekhon
# Date: 2022-06-15 18:41:42 +0100 (Wed, 15 Jun 2022)
#
# https://github.com/HariSekhon/DevOps-Bash-tools
#
# License: see accompanying Hari Sekhon LICENSE file
#
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish
#
# https://www.linkedin.com/in/HariSekhon
#
set -euo pipefail
[ -n "${DEBUG:-}" ] && set -x
srcdir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
# shellcheck disable=SC1090
. "$srcdir/lib/aws.sh"
# shellcheck disable=SC2034,SC2154
usage_description="
Finds all users, groups and roles where a given IAM policy is attached, so that you can remove all these references in your Terraform code and avoid this error:
Plan: 1 to add, 1 to change, 1 to destroy.
module.mymodule.aws_iam_policy.mypolicy: Destroying... [id=arn:aws:iam::***:policy/mypolicy]
│Error: error deleting IAM policy arn:aws:iam::***:policy/mypolicy: DeleteConflict: Cannot delete a policy attached to entities.
│ status code: 409, request id: 1f9ca3ee-48fb-4e5e-9e58-5c266e29e9be
"
help_usage "$@"
min_args 1 "$@"
policy="$1"
export AWS_DEFAULT_OUTPUT=json
aws_account_id="$(aws_account_id)"
policy_arn="arn:aws:iam::$aws_account_id:policy/$policy"
find_entities(){
local entity_type="$1"
aws iam list-entities-for-policy --policy-arn "$policy_arn" |
jq_debug_pipe_dump |
jq -r ".Policy${entity_type}s[].${entity_type}Name" |
while read -r entity; do
printf '%s\t%s\n' "$entity_type" "$entity"
done
}
find_entities User
find_entities Group
find_entities Role