Sha256: f3d6de3432ce4228601a5997bd7d28d3e615d16034c9ce0b5f251504d357ace9

Contents?: true

Size: 1.53 KB

Versions: 3

Compression:

Stored size: 1.53 KB

Contents

---
title: About the aws_iam_role Resource
platform: aws
---

# aws\_iam\_role

Use the `aws_iam_role` InSpec audit resource to test properties of a single IAM Role. A Role is a collection of permissions that may be temporarily assumed by a user, EC2 Instance, Lambda Function, or certain other resources.

<br>

## Syntax

    # Ensure that a certain role exists by name
    describe aws_iam_role('my-role') do
      it { should exist }
    end

<br>

## Resource Parameters

### role\_name

This resource expects a single parameter that uniquely identifies the IAM Role, the Role Name. You may pass it as a string, or as the value in a hash:

    describe aws_iam_role('my-role') do
      it { should exist }
    end
    # Same
    describe aws_iam_role(role_name: 'my-role') do
      it { should exist }
    end

<br>

## Properties

### description

A textual description of the IAM Role.

    describe aws_iam_role('my-role') do
      its('description') { should be('Our most important Role')}
    end

<br>

## Matchers

This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).

### exist

Indicates that the Role Name provided was found. Use `should_not` to test for IAM Roles that should not exist.

    describe aws_iam_role('should-be-there') do
      it { should exist }
    end

    describe aws_iam_role('should-not-be-there') do
      it { should_not exist }
    end

Version data entries

3 entries across 3 versions & 1 rubygems

Version Path
inspec-2.1.21 docs/resources/aws_iam_role.md.erb
inspec-2.1.10 docs/resources/aws_iam_role.md.erb
inspec-2.0.32 docs/resources/aws_iam_role.md.erb