Revoke Lease for an AWS Assume Role Secret

Hello everyone,

I have been experimenting with using the AWS secrets backend to generate dynamic assumed_role credentials. I would like to be able to revoke the lease associated with these credentials, however, when I attempt to revoke the lease for an assumed_role credential using the Vault CLI it succeeds with the following output:

Success! Revoked lease: aws/creds/my-app/<lease-id>

Even though the CLI says the lease was revoked, the credentials associated with it are still valid. I confirmed that revoking leases for iam_user AWS secrets invalidates the credentials as expected so this behavior appears to be limited to assumed_role AWS secrets.

Is this expected behavior for assumed_role secrets or am I perhaps missing a configuration option?