library
turbot/aws
- Associate IAM to EC2 Instance Profile
- Attach IAM Role Policy
- Create EBS Snapshot
- Create ELB Classic Load Balancer
- Create ELBv2 Load Balancer
- Create IAM Access Key
- Create Instance Profile
- Create IAM Policy
- Create IAM Role
- Create IAM User
- Create Lambda Function
- Create S3 Bucket
- Create SNS Topic
- Create SQS Queue
- Create VPC
- Create VPC Security Group
- Create VPC Subnet
- Delete DynamoDB Table
- Delete EBS Snapshot
- Delete EBS Volume
- Delete EKS Node Group
- Delete ElastiCache Cluster
- Delete Elastic Load Balancer
- Delete ELB v2 Load Balancer
- Delete IAM Access Key
- Delete IAM Policy
- Delete IAM Role
- Delete IAM User
- Delete Lambda Function
- Delete NAT Gateway
- Delete RDS DB Instance
- Delete Route 53 Health Check
- Delete S3 Bucket
- Delete Secrets Manager Secret
- Delete SNS Topic
- Delete SQS Queue
- Describe EBS Snapshots
- Describe EC2 Instances
- Describe IAM Instance Profile Associations
- Describe VPC Subnets
- Describe VPCs
- Detach EBS Volume
- Disassociate IAM Instance Profile
- Enable EBS Encryption by Default
- Get EBS Encryption by Default
- Get GuardDuty Finding
- Get Lambda Function
- Get S3 Bucket Versioning
- Get object from S3 bucket
- Get S3 Object Content
- Get S3 Public Access Block Configuration
- Get SNS Topic Attributes
- Get SQS Queue Attributes
- List GuardDuty Findings
- List IAM Access Keys
- List IAM Groups for User
- List IAM Users
- List S3 Buckets
- Modify EBS Volume
- Modify EC2 Instance Attributes
- Modify EC2 Instance Metadata Options
- Modify RDS DB Instance
- Put IAM Role Policy
- Put S3 Bucket Encryption
- Put S3 Bucket Lifecycle policy
- Put S3 Public Access Block
- Put S3 Bucket Versioning
- Release VPC EIP
- Revoke VPC Security Group Ingress
- Launch EC2 Instances
- Set SNS Topic Attributes
- Set SQS Queue Attributes
- Start EC2 Instances
- Stop EC2 Instances
- Subscribe to SNS Topic
- Tag Resources
- Terminate EC2 Instances
- Terminate EMR Clusters
- Test Create S3 Bucket
- Test Create SNS Topic
- Test Create SQS Queue
- Test Get Lambda Function
- Test List IAM Users
- Test Run EC2 Instance
- Test Put S3 Bucket Versioning
- Test Enable and Disable S3 Bucket Versioning
- Test Run EC2 Instance
- Test Start and Stop EC2 Instance
- Untag Resources
- Update IAM Access Key
- Update Route 53 Record
Get Involved
Version
Put IAM Role Policy
Adds or updates an inline policy document that is embedded in the specified IAM role.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws.pipeline.put_iam_role_policy \ --arg 'policy_name=<string>' \ --arg 'policy_document=<string>' \ --arg 'role_name=<string>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws.pipeline.put_iam_role_policy args = { policy_name = <string> policy_document = <string> role_name = <string> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
policy_name | string | Yes | The name of the policy document. | - |
policy_document | string | Yes | The policy document. | - |
cred | string | Yes | Name for credentials to use. If not provided, the default credentials will be used. | default |
role_name | string | Yes | The name of the role to associate the policy with. | - |
Outputs
This pipeline has no outputs.