Commit Graph

772 Commits

Author SHA1 Message Date
Scott Miller
734afbe09e Cache trusted cert values, invalidating when anything changes (#25421)
* Cache trusted cert values, invalidating when anything changes

* rename to something more indicative

* defer

* changelog

* Use an LRU cache rather than a static map so we can't use too much memory.  Add docs, unit tests

* Don't add to cache if disabled.  But this races if just a bool, so make the disabled an atomic
2024-02-15 21:48:30 +00:00
Violet Hynes
e6e0863178 VAULT-23589 add replace directive to CE (#25453) 2024-02-15 16:07:38 -05:00
Violet Hynes
a1cb18b2c2 VAULT-528 Fix Vault Agent being unable to render secrets with delete_version_after set. (#25387)
* VAULT-528 add test reproducing the failure that should pass after the fix

* VAULT-528 Upgrade consul-template to version with the fix

* VAULT-528 changelog
2024-02-13 14:49:35 -05:00
Ryan Cragun
f12014506b Rollback couchbase/gocb/v2 to v2.6.5 for 386 compat (#25368)
v2.7.x overflows on 386 targets:
../../../.go/pkg/mod/github.com/couchbase/gocb/v2@v2.7.0/search/internal.go:31:62: cannot use math.MaxUint32 (untyped int constant 4294967295) as int value in argument to fmt.Errorf (overflows)

This rolls us back to 2.6.5 until it's fixed upstream.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-02-12 19:13:59 +00:00
hc-github-team-secure-vault-core
5a13395717 Update vault-plugin-auth-jwt to v0.20.0 (#25326)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-08 16:32:59 -08:00
John-Michael Faircloth
936adc53e0 update opentelemetry dependencies (#25306) 2024-02-08 19:37:02 +00:00
Robert
23512470cd Update couchbase database plugin to v0.10.1 (#25305) 2024-02-08 19:04:02 +00:00
hc-github-team-secure-vault-core
d176aae487 Update vault-plugin-database-redis-elasticache to v0.3.0 (#25296)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-08 09:43:07 -08:00
Violet Hynes
de1f76fa56 Use new SDK and API versions for 1.16.0 (#25287) 2024-02-08 10:16:47 -05:00
hc-github-team-secure-vault-core
c55aaf5930 Update vault-plugin-database-redis to v0.2.3 (#25289)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-08 14:49:16 +00:00
hc-github-team-secure-vault-core
6488d93775 Update vault-plugin-secrets-terraform to v0.7.5 (#25288)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-08 14:47:12 +00:00
hc-github-team-secure-vault-core
88c9279f9c Update vault-plugin-secrets-kv to v0.17.0 (#25277)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 16:30:07 -06:00
hc-github-team-secure-vault-core
7b7052fd36 Update vault-plugin-database-couchbase to v0.10.0 (#25275)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 15:42:00 -06:00
hc-github-team-secure-vault-core
193c6d2a3d Update vault-plugin-database-mongodbatlas to v0.11.0 (#25264)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 19:23:58 +00:00
hc-github-team-secure-vault-core
0d83188980 Update vault-plugin-database-elasticsearch to v0.14.0 (#25263)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 18:30:59 +00:00
hc-github-team-secure-vault-core
e2a131d435 Update vault-plugin-auth-azure to v0.17.0 (#25258)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 17:31:16 +00:00
hc-github-team-secure-vault-core
f18b8e8c20 Update vault-plugin-secrets-alicloud to v0.16.0 (#25257)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 17:22:09 +00:00
hc-github-team-secure-vault-core
a3370a3ede Update vault-plugin-secrets-mongodbatlas to v0.11.0 (#25253)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 17:13:46 +00:00
hc-github-team-secure-vault-core
f370f9dae9 Update vault-plugin-secrets-openldap to v0.12.0 (#25251)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-07 16:12:56 +00:00
hc-github-team-secure-vault-core
003ee1c856 Update vault-plugin-auth-oci to v0.15.1 (#25245)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-06 22:58:41 +00:00
hc-github-team-secure-vault-core
3be2aff493 Update vault-plugin-auth-kerberos to v0.11.0 (#25232)
* Automated dependency upgrades

* Add changelog

* * go mod tidy

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: maxcoulombe <max.coulombe@hashicorp.com>
2024-02-06 11:15:45 -05:00
hc-github-team-secure-vault-core
e7817c88a0 Update vault-plugin-auth-gcp to v0.16.2 (#25233)
* Automated dependency upgrades
* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2024-02-06 10:10:44 -06:00
hc-github-team-secure-vault-core
6e4e0f46a7 Update vault-plugin-secrets-gcpkms to v0.16.0 (#25231)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-06 10:20:50 -05:00
Christopher Swenson
8f6dfaaf67 Interface for event subscription plugins; SQS plugin (#24352)
Initial version of an internal plugin interface for event subscription plugins,
and an AWS SQS plugin as an example.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2024-02-05 13:17:07 -08:00
hc-github-team-secure-vault-core
54f64631c7 Update vault-plugin-secrets-gcp to v0.18.0 (#25173)
* Automated dependency upgrades

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2024-02-05 14:08:37 -06:00
hc-github-team-secure-vault-core
ebd115f9a1 Update vault-plugin-auth-alicloud to v0.17.0 (#25217)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-05 16:37:22 +00:00
Milena Zlaticanin
c37bb96e23 Update vault-plugin-auth-kubernetes to v0.18.0 (#25207)
* Update vault-plugin-auth-kubernetes to v0.18.0

* add changelog
2024-02-02 14:44:59 -07:00
hc-github-team-secure-vault-core
51c4f7c61b Update vault-plugin-secrets-azure to v0.17.0 (#25189) 2024-02-02 15:35:42 -05:00
hc-github-team-secure-vault-core
011a4b2b0d Update vault-plugin-auth-cf to v0.16.0 (#25196) 2024-02-02 15:35:22 -05:00
hc-github-team-secure-vault-core
1597f42f0f Update vault-plugin-secrets-kubernetes to v0.7.0 (#25204) 2024-02-02 19:05:47 +00:00
hc-github-team-secure-vault-core
78b317d1d4 Update vault-plugin-secrets-ad to v0.17.0 (#25187)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-02-01 17:14:32 -05:00
Scott Miller
9477062407 Update go-kms-wrapping and related wrappers (#25146) 2024-01-31 18:22:19 +00:00
hc-github-team-secure-vault-core
fc0285aada Update vault-plugin-database-snowflake to v0.10.0 (#25143)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-01-31 17:33:54 +00:00
vinay-gopalan
fcf7cf6c22 WIF support for AWS secrets engine (#24987)
* add new plugin wif fields to AWS Secrets Engine

* add changelog

* go get awsutil v0.3.0

* fix up changelog

* fix test and field parsing helper

* godoc on new test

* require role arn when audience set

* make fmt

---------

Co-authored-by: Austin Gebauer <agebauer@hashicorp.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2024-01-29 11:34:57 -08:00
Chris Capurso
86775456a2 bump github.com/hashicorp/vault-hcp-lib (#25107) 2024-01-26 15:33:40 -05:00
Mike Palmiotto
43be9fc18a Request Limiter (#25093)
This commit introduces two new adaptive concurrency limiters in Vault,
which should handle overloading of the server during periods of
untenable request rate. The limiter adjusts the number of allowable
in-flight requests based on latency measurements performed across the
request duration. This approach allows us to reject entire requests
prior to doing any work and prevents clients from exceeding server
capacity.

The limiters intentionally target two separate vectors that have been
proven to lead to server over-utilization.

- Back pressure from the storage backend, resulting in bufferbloat in
  the WAL system. (enterprise)
- Back pressure from CPU over-utilization via PKI issue requests
  (specifically for RSA keys), resulting in failed heartbeats.

Storage constraints can be accounted for by limiting logical requests
according to their http.Method. We only limit requests with write-based
methods, since these will result in storage Puts and exhibit the
aforementioned bufferbloat.

CPU constraints are accounted for using the same underlying library and
technique; however, they require special treatment. The maximum number
of concurrent pki/issue requests found in testing (again, specifically
for RSA keys) is far lower than the minimum tolerable write request
rate. Without separate limiting, we would artificially impose limits on
tolerable request rates for non-PKI requests. To specifically target PKI
issue requests, we add a new PathsSpecial field, called limited,
allowing backends to specify a list of paths which should get
special-case request limiting.

For the sake of code cleanliness and future extensibility, we introduce
the concept of a LimiterRegistry. The registry proposed in this PR has
two entries, corresponding with the two vectors above. Each Limiter
entry has its own corresponding maximum and minimum concurrency,
allowing them to react to latency deviation independently and handle
high volumes of requests to targeted bottlenecks (CPU and storage).

In both cases, utilization will be effectively throttled before Vault
reaches any degraded state. The resulting 503 - Service Unavailable is a
retryable HTTP response code, which can be handled to gracefully retry
and eventually succeed. Clients should handle this by retrying with
jitter and exponential backoff. This is done within Vault's API, using
the go-retryablehttp library.

Limiter testing was performed via benchmarks of mixed workloads and
across a deployment of agent pods with great success.
2024-01-26 14:26:21 -05:00
Josh Black
ef26498e9c Implement raft-wal (#21460)
* Implement raft-wal

* go mod tidy

* add metrics, fix a panic

* fix the panic for real this time

* PR feedback

* refactor tests to use a helper and reduce duplication

* add a test to verify we don't use raft-wal if raft.db exists

* add config to enable the verifier

* add tests for parsing verification intervals

* run the verifier in the background

* wire up the verifier

* go mod tidy

* refactor config parsing

* remove unused function

* trying to get the verifier working

* wire up some more verifier bits

* sorted out an error, added a new test, lots of debug logging that needs to come out

* fix a bug and remove all the debugging statements

* make sure we close raft-wal stablestore too

* run verifier tests for both boltdb and raft-wal

* PR feedback

* Vault 20270 docker test raft wal (#24463)

* adding a migration test from boltdb to raftwal and back
adding a migration test using snapshot restore

* feedback

* Update physical/raft/raft.go

Co-authored-by: Paul Banks <pbanks@hashicorp.com>

* PR feedback

* change verifier function

* make this shorter

* add changelog

* Fix Close behavior

* make supporting empty logs more explicit

* add some godocs

---------

Co-authored-by: hamid ghaf <hamid@hashicorp.com>
Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
Co-authored-by: Paul Banks <pbanks@hashicorp.com>
2024-01-25 10:08:50 -08:00
hc-github-team-secure-vault-core
6c405e3a52 Update vault-plugin-secrets-ad to v0.16.2 (#25058)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-01-24 16:23:49 -07:00
hc-github-team-secure-vault-core
7f80001081 Update vault-plugin-secrets-openldap to v0.11.3 (#25040)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2024-01-24 14:10:55 -07:00
hc-github-team-secure-vault-core
4754757374 Update vault-plugin-database-snowflake to v0.9.1 (#25020)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-01-24 18:08:41 +00:00
hc-github-team-secure-vault-core
b49c673ef5 Update vault-plugin-auth-alicloud to v0.16.1 (#25014)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-01-23 16:28:32 -06:00
Ellie
dc625253ae bump github.com/hashicorp/go-kms-wrapping/wrappers/azurekeyvault/v2 version to include support for azure workload identities (#24954)
* bump github.com/hashicorp/go-kms-wrapping/wrappers/azurekeyvault/v2 version to include support for azure workload identities

* add changelog

* bump azurekeyvault/v2 to 2.0.10

* bump azcore to 1.9.1
2024-01-23 11:56:54 -06:00
hc-github-team-secure-vault-core
16ae214f71 Update hashicorp/vault-plugin-auth-jwt to v0.19.0 (#24972)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2024-01-22 09:59:08 -08:00
Violet Hynes
f55750d8d6 Update containerd to latest (#24939) 2024-01-18 15:32:43 -05:00
dependabot[bot]
fa2e001850 Bump github.com/go-git/go-git/v5 from 5.7.0 to 5.11.0 (#24641)
Bumps [github.com/go-git/go-git/v5](https://github.com/go-git/go-git) from 5.7.0 to 5.11.0.
- [Release notes](https://github.com/go-git/go-git/releases)
- [Commits](https://github.com/go-git/go-git/compare/v5.7.0...v5.11.0)

---
updated-dependencies:
- dependency-name: github.com/go-git/go-git/v5
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-01-18 10:02:38 -05:00
Violet Hynes
074a35eac6 Update aws-sdk-go to latest (#24916) 2024-01-17 15:17:00 -05:00
Raymond Ho
f0d9cee1a7 update otel package to v1.21.0 (#24830) 2024-01-12 10:23:59 -08:00
Ryan Cragun
9a10689ca3 [QT-645] Restructure dev tools (#24559)
We're on a quest to reduce our pipeline execution time to both enhance
our developer productivity but also to reduce the overall cost of the CI
pipeline. The strategy we use here reduces workflow execution time and
network I/O cost by reducing our module cache size and using binary
external tools when possible. We no longer download modules and build
many of the external tools thousands of times a day.

Our previous process of installing internal and external developer tools
was scattered and inconsistent. Some tools were installed via `go
generate -tags tools ./tools/...`,
others via various `make` targets, and some only in Github Actions
workflows. This process led to some undesirable side effects:
  * The modules of some dev and test tools were included with those
    of the Vault project. This leads to us having to manage our own
    Go modules with those of external tools. Prior to Go 1.16 this
    was the recommended way to handle external tools, but now
    `go install tool@version` is the recommended way to handle
    external tools that need to be build from source as it supports
    specific versions but does not modify the go.mod.
  * Due to Github cache constraints we combine our build and test Go
    module caches together, but having our developer tools as deps in
    our module results in a larger cache which is downloaded on every
    build and test workflow runner. Removing the external tools that were
    included in our go.mod reduced the expanded module cache by size
    by ~300MB, thus saving time and network I/O costs when downloading
    the module cache.
  * Not all of our developer tools were included in our modules. Some were
    being installed with `go install` or `go run`, so they didn't take
    advantage of a single module cache. This resulted in us downloading
    Go modules on every CI and Build runner in order to build our
    external tools.
  * Building our developer tools from source in CI is slow. Where possible
    we can prefer to use pre-built binaries in CI workflows. No more
    module download or tool compiles if we can avoid them.

I've refactored how we define internal and external build tools
in our Makefile and added several new targets to handle both building
the developer tools locally for development and verifying that they are
available. This allows for an easy developer bootstrap while also
supporting installation of many of the external developer tools from
pre-build binaries in CI. This reduces our network IO and run time
across nearly all of our actions runners.

While working on this I caught and resolved a few unrelated issue:
* Both our Go and Proto format checks we're being run incorrectly. In
  CI they we're writing changes but not failing if changes were
  detected. The Go was less of a problem as we have git hooks that
  are intended to enforce formatting, however we drifted over time.
* Our Git hooks couldn't handle removing a Go file without failing. I
  moved the diff check into the new Go helper and updated it to handle
  removing files.
* I combined a few separate scripts and into helpers and added a few
  new capabilities.
* I refactored how we install Go modules to make it easier to download
  and tidy all of the projects go.mod's.
* Refactor our internal and external tool installation and verification
  into a tools.sh helper.
* Combined more complex Go verification into `scripts/go-helper.sh` and
  utilize it in the `Makefile` and git commit hooks.
* Add `Makefile` targets for executing our various tools.sh helpers.
* Update our existing `make` targets to use new tool targets.
* Normalize our various scripts and targets output to have a consistent
  output format.
* In CI, install many of our external dependencies as binaries wherever
  possible. When not possible we'll build them from scratch but not mess
  with the shared module cache.
* [QT-641] Remove our external build tools from our project Go modules.
* [QT-641] Remove extraneous `go list`'s from our `set-up-to` composite
  action.
* Fix formatting and regen our protos

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-01-09 17:50:46 +00:00
dependabot[bot]
ec584a271e Bump github.com/cloudflare/circl from 1.3.3 to 1.3.7 (#24708)
Bumps [github.com/cloudflare/circl](https://github.com/cloudflare/circl) from 1.3.3 to 1.3.7.
- [Release notes](https://github.com/cloudflare/circl/releases)
- [Commits](https://github.com/cloudflare/circl/compare/v1.3.3...v1.3.7)

---
updated-dependencies:
- dependency-name: github.com/cloudflare/circl
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-01-09 09:49:38 -05:00
Bianca Moreira
e0216cab5b Add HCP subcommand -- integrate with HCP library (#23897)
* Add HCP engine token logic

* Update documentation

* Fix content check

* Add changelog entry

* Update changelog/23897.txt

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Update api/client.go

Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>

* Add error when HCP commands failed to be initialize

* Add tests for initHCPcommand function

* Update lib dependency

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Fix docs nav data

* Improve docs sections

* Update hcp lib dependency

* Fix content formatting

* Update lib dependency

* Fix HCPtokenhelper problem

* Fix HCPtokenhelper problem

* Remove HCP env variables

* Remove hcp helper token

* Add error treatment for no valid credential source

* Update website/content/docs/commands/hcp/index.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/commands/hcp/disconnect.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/commands/hcp/connect.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/commands/hcp/disconnect.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/commands/hcp/index.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/hcp/connect.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Modify hcp tests

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-01-09 15:29:30 +01:00