diff --git a/vault/resource_aws_secret_backend_role.go b/vault/resource_aws_secret_backend_role.go index 416e748743..30ff0e9fd6 100644 --- a/vault/resource_aws_secret_backend_role.go +++ b/vault/resource_aws_secret_backend_role.go @@ -36,10 +36,9 @@ func awsSecretBackendRoleResource() *schema.Resource { Description: "The path of the AWS Secret Backend the role belongs to.", }, "policy_arns": { - Type: schema.TypeSet, - Optional: true, - ConflictsWith: []string{"policy", "policy_arn", "role_arns"}, - Description: "ARN for an existing IAM policy the role should use.", + Type: schema.TypeSet, + Optional: true, + Description: "ARN for an existing IAM policy the role should use.", Elem: &schema.Schema{ Type: schema.TypeString, }, @@ -54,7 +53,6 @@ func awsSecretBackendRoleResource() *schema.Resource { "policy_document": { Type: schema.TypeString, Optional: true, - ConflictsWith: []string{"policy_arn", "policy"}, Description: "IAM policy the role should use in JSON format.", DiffSuppressFunc: util.JsonDiffSuppress, }, @@ -76,10 +74,9 @@ func awsSecretBackendRoleResource() *schema.Resource { Elem: &schema.Schema{ Type: schema.TypeString, }, - Optional: true, - ForceNew: true, - ConflictsWith: []string{"policy", "policy_arn", "policy_arns"}, - Description: "ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'", + Optional: true, + ForceNew: true, + Description: "ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'", }, "default_sts_ttl": { Type: schema.TypeInt, diff --git a/website/docs/r/aws_secret_backend_role.html.md b/website/docs/r/aws_secret_backend_role.html.md index d949c437cc..44c8838db7 100644 --- a/website/docs/r/aws_secret_backend_role.html.md +++ b/website/docs/r/aws_secret_backend_role.html.md @@ -29,7 +29,7 @@ resource "vault_aws_secret_backend" "aws" { resource "vault_aws_secret_backend_role" "role" { backend = "${vault_aws_secret_backend.aws.path}" name = "deploy" - credential_type = "assumed_role" + credential_type = "iam_user" policy_document = <