AddRoleToInstanceProfile
Adds the specified IAM role to the specified instance profile. An instance profile
can contain only one role, and this quota cannot be increased. You can remove the
existing role and then add a different role to an instance profile. You must then wait
for the change to appear across all of AWS because of eventual
consistency
Note
The caller of this operation must be granted the PassRole
permission
on the IAM role by a permissions policy.
Important
When using the iam:AssociatedResourceArn condition in a policy to restrict the PassRole IAM action, special considerations apply if the policy is
intended to define access for the AddRoleToInstanceProfile
action. In
this case, you cannot specify a Region or instance ID in the EC2 instance ARN. The
ARN value must be arn:aws:ec2:*:CallerAccountId:instance/*
. Using any
other ARN value may lead to unexpected evaluation results.
For more information about roles, see IAM roles in the IAM User Guide. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
Request Parameters
For information about the parameters that are common to all actions, see Common Parameters.
- InstanceProfileName
-
The name of the instance profile to update.
This parameter allows (through its regex pattern
) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@- Type: String
Length Constraints: Minimum length of 1. Maximum length of 128.
Pattern:
[\w+=,.@-]+
Required: Yes
- RoleName
-
The name of the role to add.
This parameter allows (through its regex pattern
) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@- Type: String
Length Constraints: Minimum length of 1. Maximum length of 64.
Pattern:
[\w+=,.@-]+
Required: Yes
Errors
For information about the errors that are common to all actions, see Common Errors.
- EntityAlreadyExists
-
The request was rejected because it attempted to create a resource that already exists.
HTTP Status Code: 409
- LimitExceeded
-
The request was rejected because it attempted to create resources beyond the current AWS account limits. The error message describes the limit exceeded.
HTTP Status Code: 409
- NoSuchEntity
-
The request was rejected because it referenced a resource entity that does not exist. The error message describes the resource.
HTTP Status Code: 404
- ServiceFailure
-
The request processing has failed because of an unknown error, exception or failure.
HTTP Status Code: 500
- UnmodifiableEntity
-
The request was rejected because service-linked roles are protected AWS resources. Only the service that depends on the service-linked role can modify or delete the role on your behalf. The error message includes the name of the service that depends on this service-linked role. You must request the change through that service.
HTTP Status Code: 400
Examples
Example
This example illustrates one usage of AddRoleToInstanceProfile.
Sample Request
https://iam.amazonaws.com/?Action=AddRoleToInstanceProfile
&InstanceProfileName=Webserver
&RoleName=S3Access
&Version=2010-05-08
&AUTHPARAMS
Sample Response
<AddRoleToInstanceProfileResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ResponseMetadata>
<RequestId>12657608-99f2-11e1-a4c3-27EXAMPLE804</RequestId>
</ResponseMetadata>
</AddRoleToInstanceProfileResponse>
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following: