@@ -308,11 +308,6 @@ Parameters:
308
308
Description : Optional - A name for the IAM Role attached to the Instance Profile
309
309
Default : " "
310
310
311
- InstanceRolePermissionsBoundaryARN :
312
- Type : String
313
- Description : The ARN of the policy used to set the permissions boundary for the role.
314
- Default : " "
315
-
316
311
InstanceOperatingSystem :
317
312
Type : String
318
313
Description : The operating system to run on the instances
@@ -450,9 +445,6 @@ Conditions:
450
445
SetInstanceRoleName :
451
446
!Not [ !Equals [ !Ref InstanceRoleName, "" ] ]
452
447
453
- SetInstanceRolePermissionsBoundaryARN :
454
- !Not [ !Equals [ !Ref InstanceRolePermissionsBoundaryARN, "" ] ]
455
-
456
448
UseSpecifiedSecretsBucket :
457
449
!Not [ !Equals [ !Ref SecretsBucket, "" ] ]
458
450
@@ -664,7 +656,6 @@ Resources:
664
656
Type : AWS::IAM::Role
665
657
Properties :
666
658
RoleName : !If [ SetInstanceRoleName, !Ref InstanceRoleName, !Sub "${AWS::StackName}-Role" ]
667
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
668
659
ManagedPolicyArns : !If
669
660
- HasManagedPolicies
670
661
# Support multiple policies to attach by merging the values together and splitting on ','
@@ -1028,7 +1019,6 @@ Resources:
1028
1019
AsgProcessSuspenderRole :
1029
1020
Type : AWS::IAM::Role
1030
1021
Properties :
1031
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
1032
1022
AssumeRolePolicyDocument :
1033
1023
Version : 2012-10-17
1034
1024
Statement :
@@ -1105,7 +1095,6 @@ Resources:
1105
1095
Type : AWS::IAM::Role
1106
1096
Condition : HasVariableSize
1107
1097
Properties :
1108
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
1109
1098
Path : " /"
1110
1099
AssumeRolePolicyDocument :
1111
1100
Version : ' 2012-10-17'
0 commit comments