mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	* Lazy load plugins to avoid setup-unwrap cycle * Remove commented blocks * Refactor NewTestCluster, use single core cluster on basic plugin tests * Set c.pluginDirectory in TestAddTestPlugin for setupPluginCatalog to work properly * Add special path to mock plugin * Move ensureCoresSealed to vault/testing.go * Use same method for EnsureCoresSealed and Cleanup * Bump ensureCoresSealed timeout to 60s * Correctly handle nil opts on NewTestCluster * Add metadata flag to APIClientMeta, use meta-enabled plugin when mounting to bootstrap * Check metadata flag directly on the plugin process * Plumb isMetadataMode down to PluginRunner * Add NOOP shims when running in metadata mode * Remove unused flag from the APIMetadata object * Remove setupSecretPlugins and setupCredentialPlugins functions * Move when we setup rollback manager to after the plugins are initialized * Fix tests * Fix merge issue * start rollback manager after the credential setup * Add guards against running certain client and server functions while in metadata mode * Call initialize once a plugin is loaded on the fly * Add more tests, update basic secret/auth plugin tests to trigger lazy loading * Skip mount if plugin removed from catalog * Fixup * Remove commented line on LookupPlugin * Fail on mount operation if plugin is re-added to catalog and mount is on existing path * Check type and special paths on startBackend * Fix merge conflicts * Refactor PluginRunner run methods to use runCommon, fix TestSystemBackend_Plugin_auth
		
			
				
	
	
		
			24 lines
		
	
	
		
			455 B
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			24 lines
		
	
	
		
			455 B
		
	
	
	
		
			Go
		
	
	
	
	
	
package pluginutil
 | 
						|
 | 
						|
import (
 | 
						|
	"os"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/helper/mlock"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	// PluginMlockEnabled is the ENV name used to pass the configuration for
 | 
						|
	// enabling mlock
 | 
						|
	PluginMlockEnabled = "VAULT_PLUGIN_MLOCK_ENABLED"
 | 
						|
)
 | 
						|
 | 
						|
// OptionallyEnableMlock determines if mlock should be called, and if so enables
 | 
						|
// mlock.
 | 
						|
func OptionallyEnableMlock() error {
 | 
						|
	if os.Getenv(PluginMlockEnabled) == "true" {
 | 
						|
		return mlock.LockMemory()
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |