policies

@JvmName(name = "elqkrkimgevsevij")
suspend fun policies(value: Output<List<RolePolicyArgs>>)
@JvmName(name = "cuormqqhkflgmhcw")
suspend fun policies(value: List<RolePolicyArgs>?)

Parameters

value

Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role. You can update a role's trust policy later. For more information about IAM roles, go to Using Roles to Delegate Permissions and Federate Identities . A role can also have an attached managed policy. For information about policies, see Managed Policies and Inline Policies in the IAM User Guide . For information about limits on the number of inline policies that you can embed with a role, see Limitations on IAM Entities in the IAM User Guide .

If an external policy (such as AWS::IAM::Policy or AWS::IAM::ManagedPolicy ) has a Ref to a role and if a resource (such as AWS::ECS::Service ) also has a Ref to the same role, add a DependsOn attribute to the resource to make the resource depend on the external policy. This dependency ensures that the role's policy is available throughout the resource's lifecycle. For example, when you delete a stack with an AWS::ECS::Service resource, the DependsOn attribute ensures that AWS CloudFormation deletes the AWS::ECS::Service resource before deleting its role's policy.


@JvmName(name = "sgylahjehaxeuvxp")
suspend fun policies(vararg values: Output<RolePolicyArgs>)


@JvmName(name = "eskukskdviqebrrr")
suspend fun policies(values: List<Output<RolePolicyArgs>>)
@JvmName(name = "wkfpifqqinjbusgy")
suspend fun policies(vararg values: RolePolicyArgs)

Parameters

values

Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role. You can update a role's trust policy later. For more information about IAM roles, go to Using Roles to Delegate Permissions and Federate Identities . A role can also have an attached managed policy. For information about policies, see Managed Policies and Inline Policies in the IAM User Guide . For information about limits on the number of inline policies that you can embed with a role, see Limitations on IAM Entities in the IAM User Guide .

If an external policy (such as AWS::IAM::Policy or AWS::IAM::ManagedPolicy ) has a Ref to a role and if a resource (such as AWS::ECS::Service ) also has a Ref to the same role, add a DependsOn attribute to the resource to make the resource depend on the external policy. This dependency ensures that the role's policy is available throughout the resource's lifecycle. For example, when you delete a stack with an AWS::ECS::Service resource, the DependsOn attribute ensures that AWS CloudFormation deletes the AWS::ECS::Service resource before deleting its role's policy.


@JvmName(name = "mkusmjyhvdiqvkgu")
suspend fun policies(argument: List<suspend RolePolicyArgsBuilder.() -> Unit>)
@JvmName(name = "sspxgjehxqlhhnvx")
suspend fun policies(vararg argument: suspend RolePolicyArgsBuilder.() -> Unit)
@JvmName(name = "omjjfrleioiqhssa")
suspend fun policies(argument: suspend RolePolicyArgsBuilder.() -> Unit)

Parameters

argument

Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role. You can update a role's trust policy later. For more information about IAM roles, go to Using Roles to Delegate Permissions and Federate Identities . A role can also have an attached managed policy. For information about policies, see Managed Policies and Inline Policies in the IAM User Guide . For information about limits on the number of inline policies that you can embed with a role, see Limitations on IAM Entities in the IAM User Guide .

If an external policy (such as AWS::IAM::Policy or AWS::IAM::ManagedPolicy ) has a Ref to a role and if a resource (such as AWS::ECS::Service ) also has a Ref to the same role, add a DependsOn attribute to the resource to make the resource depend on the external policy. This dependency ensures that the role's policy is available throughout the resource's lifecycle. For example, when you delete a stack with an AWS::ECS::Service resource, the DependsOn attribute ensures that AWS CloudFormation deletes the AWS::ECS::Service resource before deleting its role's policy.