Smaws_Client_WAF.PutPermissionPolicy
val request :
Smaws_Lib.Context.t ->
put_permission_policy_request ->
(put_permission_policy_response,
[> Smaws_Lib.Protocols.AwsJson.error
| `WAFInternalErrorException of waf_internal_error_exception
| `WAFInvalidPermissionPolicyException of
waf_invalid_permission_policy_exception
| `WAFNonexistentItemException of waf_nonexistent_item_exception
| `WAFStaleDataException of waf_stale_data_exception ])
Stdlib.result
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Attaches an IAM policy to the specified resource. The only supported use for this action is to share a RuleGroup across accounts.
The PutPermissionPolicy
is subject to the following restrictions:
PutPermissionPolicy
request.Effect
, Action
and Principal
.Effect
must specify Allow
.Action
in the policy must be waf:UpdateWebACL
, waf-regional:UpdateWebACL
, waf:GetRuleGroup
and waf-regional:GetRuleGroup
. Any extra or wildcard actions in the policy will be rejected.Resource
parameter.For more information, see IAM Policies.
An example of a valid policy parameter is shown in the Examples section below.