File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -643,7 +643,7 @@ Resources:
643
643
Type : AWS::IAM::Role
644
644
Properties :
645
645
RoleName : !If [ SetInstanceRoleName, !Ref InstanceRoleName, !Sub "${AWS::StackName}-Role" ]
646
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
646
+ PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN, !Ref "AWS::NoValue" ]
647
647
ManagedPolicyArns : !If
648
648
- HasManagedPolicies
649
649
# Support multiple policies to attach by merging the values together and splitting on ','
@@ -984,7 +984,7 @@ Resources:
984
984
AsgProcessSuspenderRole :
985
985
Type : AWS::IAM::Role
986
986
Properties :
987
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
987
+ PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN, !Ref "AWS::NoValue" ]
988
988
AssumeRolePolicyDocument :
989
989
Version : 2012-10-17
990
990
Statement :
@@ -1061,7 +1061,7 @@ Resources:
1061
1061
Type : AWS::IAM::Role
1062
1062
Condition : HasVariableSize
1063
1063
Properties :
1064
- PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN ]
1064
+ PermissionsBoundary : !If [ SetInstanceRolePermissionsBoundaryARN, !Ref InstanceRolePermissionsBoundaryARN, !Ref "AWS::NoValue" ]
1065
1065
Path : " /"
1066
1066
AssumeRolePolicyDocument :
1067
1067
Version : ' 2012-10-17'
You can’t perform that action at this time.
0 commit comments