Smaws_Client_WAFV2.PutPermissionPolicyUse this to share a rule group with other accounts.
This action attaches an IAM policy to the specified resource. You must be the owner of the rule group to perform this operation.
This action is subject to the following restrictions:
PutPermissionPolicy request.RuleGroup ARN and the rule group must exist in the same Region.If a rule group has been shared with your account, you can access it through the call GetRuleGroup, and you can reference it in CreateWebACL and UpdateWebACL. Rule groups that are shared with you don't appear in your WAF console rule groups listing.
val error_to_string :
[ Smaws_Lib.Protocols.AwsJson.error
| `WAFInternalErrorException of Types.waf_internal_error_exception
| `WAFInvalidParameterException of Types.waf_invalid_parameter_exception
| `WAFInvalidPermissionPolicyException of
Types.waf_invalid_permission_policy_exception
| `WAFNonexistentItemException of Types.waf_nonexistent_item_exception ] ->
stringval request :
'http_type Smaws_Lib.Context.t ->
Types.put_permission_policy_request ->
(Types.put_permission_policy_response,
[> Smaws_Lib.Protocols.AwsJson.error
| `WAFInternalErrorException of Types.waf_internal_error_exception
| `WAFInvalidParameterException of Types.waf_invalid_parameter_exception
| `WAFInvalidPermissionPolicyException of
Types.waf_invalid_permission_policy_exception
| `WAFNonexistentItemException of Types.waf_nonexistent_item_exception ])
Stdlib.result