put_permission_policy
(**kwargs)¶Note
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Attaches an IAM policy to the specified resource. The only supported use for this action is to share a RuleGroup across accounts.
The PutPermissionPolicy
is subject to the following restrictions:
PutPermissionPolicy
request.Effect
, Action
and Principal
.Effect
must specify Allow
.Action
in the policy must be waf:UpdateWebACL
, waf-regional:UpdateWebACL
, waf:GetRuleGroup
and waf-regional:GetRuleGroup
. Any extra or wildcard actions in the policy will be rejected.Resource
parameter.For more information, see IAM Policies.
An example of a valid policy parameter is shown in the Examples section below.
See also: AWS API Documentation
Request Syntax
response = client.put_permission_policy(
ResourceArn='string',
Policy='string'
)
[REQUIRED]
The Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy.
[REQUIRED]
The policy to attach to the specified RuleGroup.
dict
Response Syntax
{}
Response Structure
Exceptions
WAFRegional.Client.exceptions.WAFInternalErrorException
WAFRegional.Client.exceptions.WAFStaleDataException
WAFRegional.Client.exceptions.WAFNonexistentItemException
WAFRegional.Client.exceptions.WAFInvalidPermissionPolicyException