update_assume_role_policy
(**kwargs)¶Updates the policy that grants an IAM entity permission to assume a role. This is typically referred to as the "role trust policy". For more information about roles, see Using roles to delegate permissions and federate identities.
See also: AWS API Documentation
Request Syntax
response = client.update_assume_role_policy(
RoleName='string',
PolicyDocument='string'
)
[REQUIRED]
The name of the role to update with the new policy.
This parameter allows (through its regex pattern ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
[REQUIRED]
The policy that grants an entity permission to assume the role.
You must provide policies in JSON format in IAM. However, for CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. CloudFormation always converts a YAML policy to JSON format before submitting it to IAM.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
\u0020
) through the end of the ASCII character range\u00FF
)\u0009
), line feed ( \u000A
), and carriage return ( \u000D
)None
Exceptions
IAM.Client.exceptions.NoSuchEntityException
IAM.Client.exceptions.MalformedPolicyDocumentException
IAM.Client.exceptions.LimitExceededException
IAM.Client.exceptions.UnmodifiableEntityException
IAM.Client.exceptions.ServiceFailureException
Examples
The following command updates the role trust policy for the role named Test-Role:
response = client.update_assume_role_policy(
PolicyDocument='{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":["ec2.amazonaws.com"]},"Action":["sts:AssumeRole"]}]}',
RoleName='S3AccessForEC2Instances',
)
print(response)
Expected Output:
{
'ResponseMetadata': {
'...': '...',
},
}