When passing AwsIamRoleDetails as input to an Aws::Client method, you can use a vanilla Hash:
{
assume_role_policy_document: "AwsIamRoleAssumeRolePolicyDocument",
attached_managed_policies: [
{
policy_name: "NonEmptyString",
policy_arn: "NonEmptyString",
},
],
create_date: "NonEmptyString",
instance_profile_list: [
{
arn: "NonEmptyString",
create_date: "NonEmptyString",
instance_profile_id: "NonEmptyString",
instance_profile_name: "NonEmptyString",
path: "NonEmptyString",
roles: [
{
arn: "NonEmptyString",
assume_role_policy_document: "AwsIamRoleAssumeRolePolicyDocument",
create_date: "NonEmptyString",
path: "NonEmptyString",
role_id: "NonEmptyString",
role_name: "NonEmptyString",
},
],
},
],
permissions_boundary: {
permissions_boundary_arn: "NonEmptyString",
permissions_boundary_type: "NonEmptyString",
},
role_id: "NonEmptyString",
role_name: "NonEmptyString",
role_policy_list: [
{
policy_name: "NonEmptyString",
},
],
max_session_duration: 1,
path: "NonEmptyString",
}
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4