update_assume_role_policy

update_assume_role_policy(**kwargs)

Updates the policy that grants an IAM entity permission to assume a role. This is typically referred to as the "role trust policy". For more information about roles, see Using roles to delegate permissions and federate identities.

See also: AWS API Documentation

Request Syntax

response = client.update_assume_role_policy(
    RoleName='string',
    PolicyDocument='string'
)
Parameters
  • RoleName (string) --

    [REQUIRED]

    The name of the role to update with the new policy.

    This parameter allows (through its regex pattern ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-

  • PolicyDocument (string) --

    [REQUIRED]

    The policy that grants an entity permission to assume the role.

    You must provide policies in JSON format in IAM. However, for CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. CloudFormation always converts a YAML policy to JSON format before submitting it to IAM.

    The regex pattern used to validate this parameter is a string of characters consisting of the following:

    • Any printable ASCII character ranging from the space character ( \u0020 ) through the end of the ASCII character range
    • The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF )
    • The special characters tab ( \u0009 ), line feed ( \u000A ), and carriage return ( \u000D )
Returns

None

Exceptions

  • IAM.Client.exceptions.NoSuchEntityException
  • IAM.Client.exceptions.MalformedPolicyDocumentException
  • IAM.Client.exceptions.LimitExceededException
  • IAM.Client.exceptions.UnmodifiableEntityException
  • IAM.Client.exceptions.ServiceFailureException

Examples

The following command updates the role trust policy for the role named Test-Role:

response = client.update_assume_role_policy(
    PolicyDocument='{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":["ec2.amazonaws.com"]},"Action":["sts:AssumeRole"]}]}',
    RoleName='S3AccessForEC2Instances',
)

print(response)

Expected Output:

{
    'ResponseMetadata': {
        '...': '...',
    },
}