You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Implement a system to define plugin version constraints. This is useful on cases where plugin.HandshareConfig.ProtocolVersion has not changed, but a patch has been implemented in either Vault or a plugin.
Sample scenario: If a plugin (e.g. 0.1.0) has been updated to have a change in behavior (a change that applies to Vault 0.9.0+), but being ran under an older version of Vault (e.g. 0.8.3), core might not respect those changes. Both Vault versions are using ProtocolVersion: 3, and bumping this for a single plugin patch is non-ideal since it would force all other plugins to be rebuilt as well. In this scenario, Vault (0.8.3) would constraint the version of the plugin to be less than the version that implemented this change in behavior. On the other hand, if a newer version of Vault is being ran (0.9.0+), the constraint might be that the plugin needs to be 0.1.0 and above.
Issues that are not reproducible and/or not had any interaction for a long time are stale issues. Sometimes even the valid issues remain stale lacking traction either by the maintainers or the community. In order to provide faster responses and better engagement with the community, we strive to keep the issue tracker clean and the issue count low. In this regard, our current policy is to close stale issues after 30 days. Closed issues will still be indexed and available for future viewers. If users feel that the issue is still relevant but is wrongly closed, we encourage reopening them.
Feature Request:
Implement a system to define plugin version constraints. This is useful on cases where
plugin.HandshareConfig.ProtocolVersion
has not changed, but a patch has been implemented in either Vault or a plugin.Sample scenario: If a plugin (e.g. 0.1.0) has been updated to have a change in behavior (a change that applies to Vault 0.9.0+), but being ran under an older version of Vault (e.g. 0.8.3), core might not respect those changes. Both Vault versions are using
ProtocolVersion: 3
, and bumping this for a single plugin patch is non-ideal since it would force all other plugins to be rebuilt as well. In this scenario, Vault (0.8.3) would constraint the version of the plugin to be less than the version that implemented this change in behavior. On the other hand, if a newer version of Vault is being ran (0.9.0+), the constraint might be that the plugin needs to be 0.1.0 and above.cc @briankassouf
The text was updated successfully, but these errors were encountered: