Updates for Plugin Portal deprecation in favor of new Integrations section (#18898)

* Add Redirect for Plugin Portal -> Integration Library

* Remove Plugin Portal page & update sidebar

* Replace the Plugin Portal link to point Vault Integrations (#18897)

* Replace the Plugin Portal link to point Vault Integrations

* Update website/content/docs/partnerships.mdx

Co-authored-by: Brandon Romano <brandon@hashicorp.com>

---------

Co-authored-by: Brandon Romano <brandon@hashicorp.com>

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
This commit is contained in:
Brandon Romano
2023-01-31 10:17:18 -08:00
committed by GitHub
parent efa8c22f17
commit f7fcf32fd1
7 changed files with 18 additions and 160 deletions

View File

@@ -42,6 +42,9 @@ plugins can be made to implement [plugin multiplexing](/vault/docs/plugins/plugi
to improve performance. Plugin multiplexing allows plugin processes to be
reused across all mounts of a given type.
-> **NOTE:** See the [Vault Integrations](/vault/integrations) page to find a
curated collection of official, partner, and community Vault plugins.
## Plugin Versioning
Vault supports managing, running and upgrading plugins using semantic version

View File

@@ -16,6 +16,9 @@ It is possible to enable a custom plugin with a name that's identical to a
built-in plugin. In such a situation, Vault will always choose the custom plugin
when enabling it.
-> **NOTE:** See the [Vault Integrations](/vault/integrations) page to find a
curated collection of official, partner, and community Vault plugins.
## External Plugin Lifecycle
Vault external plugins are long-running processes that remain running once they are

View File

@@ -121,6 +121,6 @@ Other HashiCorp plugin development resources:
### Plugin Development - Resources - Community
See the [Plugin Portal](/vault/docs/plugins/plugin-portal#community) to find
Community plugin examples/guides developed by community members. HashiCorp does
not validate these for correctness.
See the [Vault Integrations](/vault/integrations) page to find Community
plugin examples/guides developed by community members. HashiCorp does not
validate these for correctness.

View File

@@ -1,153 +0,0 @@
---
layout: docs
page_title: Plugin Portal
description: A curated collection of official, partner, and community Vault plugins.
---
# Plugin Portal
This page contains a curated collection of official, partner, and community
[Vault plugins](/vault/docs/plugins).
For more information about plugin development, refer to this [documentation
section](/vault/docs/plugins/plugin-development). In addition, the [Custom Secrets Engines](/vault/tutorials/custom-secrets-engine) tutorial series demonstrates the plugin development workflow in more detail.
## Official
Official plugins are supported and maintained by HashiCorp.
Unless indicated otherwise, these plugins are available directly in the Vault
binary, but they can also be built and registered to Vault as external plugins
if necessary.
If a plugin exists separately under its own repository, follow the instructions
within that repository to develop, test, and build the plugin. If a repository
exists within the Vault repository, the plugin can be built as instructed in
[here](/vault/docs/plugins#built-in-plugins).
### Auth
<Columns count={2}>
- [AliCloud](https://github.com/hashicorp/vault-plugin-auth-alicloud)
- [AppRole](/vault/api-docs/auth/approle)
- [Amazon Web Services (AWS)](/vault/api-docs/auth/aws)
- [Azure](https://github.com/hashicorp/vault-plugin-auth-azure)
- [Centrify](https://github.com/hashicorp/vault-plugin-auth-centrify)
- [Cloud Foundry](https://github.com/hashicorp/vault-plugin-auth-cf)
- [GitHub](/vault/api-docs/auth/github)
- [Google Cloud Platform (GCP)](https://github.com/hashicorp/vault-plugin-auth-gcp)
- [JWT/OIDC](https://github.com/hashicorp/vault-plugin-auth-jwt)
- [Kerberos](https://github.com/hashicorp/vault-plugin-auth-kerberos)
- [Kubernetes](https://github.com/hashicorp/vault-plugin-auth-kubernetes)
- [Okta](/vault/api-docs/auth/okta)
- [Oracle Cloud Infrastructure (OCI)](https://github.com/hashicorp/vault-plugin-auth-oci)
- [RADIUS](/vault/api-docs/auth/radius)
- [TLS Certificates](/vault/api-docs/auth/cert)
- [Username/Password](/vault/api-docs/auth/userpass)
</Columns>
### Database
<Columns count={2}>
- [Cassandra](/vault/api-docs/secret/databases/cassandra)
- [Couchbase](https://github.com/hashicorp/vault-plugin-database-couchbase)
- [Elasticsearch](https://github.com/hashicorp/vault-plugin-database-elasticsearch)
- [InfluxDB](/vault/api-docs/secret/databases/influxdb)
- [HanaDB](/vault/api-docs/secret/databases/hanadb)
- [MongoDB](/vault/api-docs/secret/databases/mongodb)
- [MongoDB Atlas](https://github.com/hashicorp/vault-plugin-database-mongodbatlas)
- [MSSQL](/vault/api-docs/secret/databases/mssql)
- [MySQL/MariaDB](/vault/api-docs/secret/databases/mysql-maria)
- [Oracle Database](https://github.com/hashicorp/vault-plugin-database-oracle) <Tag title='external' color='yellow' />
- [PostgreSQL](/vault/api-docs/secret/databases/postgresql)
- [Redis](/vault/api-docs/secret/databases/redis)
- [Redis ElastiCache](/vault/api-docs/secret/databases/rediselasticache)
- [Redshift](/vault/api-docs/secret/databases/redshift)
- [Snowflake](https://github.com/hashicorp/vault-plugin-database-snowflake)
</Columns>
### Secrets
<Columns count={2}>
- [Active Directory](https://github.com/hashicorp/vault-plugin-secrets-ad)
- [AliCloud](https://github.com/hashicorp/vault-plugin-secrets-alicloud)
- [Amazon Web Services AWS](/vault/api-docs/secret/aws)
- [Azure](https://github.com/hashicorp/vault-plugin-secrets-azure)
- [Consul](/vault/api-docs/secret/consul)
- [Google Cloud Platform (GCP)](https://github.com/hashicorp/vault-plugin-secrets-gcp)
- [GCP KMS](https://github.com/hashicorp/vault-plugin-secrets-gcpkms)
- [KMIP](/vault/api-docs/secret/kmip) <sup>ENTERPRISE</sup>
- [Key Management](/vault/api-docs/secret/key-management) <sup>ENTERPRISE</sup>
- [Key/Value (KV)](https://github.com/hashicorp/vault-plugin-secrets-kv)
- [Kubernetes](https://github.com/hashicorp/vault-plugin-secrets-kubernetes)
- [MongoDB Atlas](https://github.com/hashicorp/vault-plugin-secrets-mongodbatlas)
- [Nomad](/vault/api-docs/secret/nomad)
- [LDAP](https://github.com/hashicorp/vault-plugin-secrets-openldap)
- [PKI](/vault/api-docs/secret/pki)
- [RabbitMQ](/vault/api-docs/secret/rabbitmq)
- [SSH](/vault/api-docs/secret/ssh)
- [TOTP](/vault/api-docs/secret/totp)
- [Transform](/vault/api-docs/secret/transform) <sup>ENTERPRISE</sup>
- [Transit](/vault/api-docs/secret/transit)
</Columns>
## Partner
Partner plugins are developed by HashiCorp partners and are owned and maintained by the technology partner. HashiCorp has verified the authenticity of the partners plugin, and that the partner is a member of the [HashiCorp Technology Partner Program](https://www.hashicorp.com/partners/become-a-partner#technology). Compatibility and stability guarantees on these plugins are established by their authors.
### Auth
- [Exoscale](https://github.com/exoscale/vault-plugin-auth-exoscale)
- [TencentCloud](https://github.com/tencentcloudstack/vault-plugin-auth-tencentcloud)
### Database
- [Aerospike](https://github.com/aerospike-community/vault-plugin-database-aerospike)
- [DataStax Astra DB](https://github.com/datastax/vault-plugin-secrets-datastax-astra)
- [Redis Enterprise](https://github.com/RedisLabs/vault-plugin-database-redis-enterprise)
### Secrets
- [Exoscale](https://github.com/exoscale/vault-plugin-secrets-exoscale)
- [GMO GlobalSign](https://github.com/globalsign/atlas-hashicorp-vault)
- [JFrog Artifactory](https://github.com/jfrog/artifactory-secrets-plugin)
- [PrimeKey EJBCA](https://github.com/primekeydevs/ejbca-vault-plugin)
- [TencentCloud](https://github.com/tencentcloudstack/vault-plugin-secrets-tencentcloud)
- [Venafi](https://github.com/Venafi/vault-pki-backend-venafi)
## Community
Community plugins are developed by community members. Compatibility and
stability guarantees on these plugins are established by their authors.
Plugin authors who wish to have their plugins listed may file a submission via a
[GitHub issue][github-issue] or directly open a pull request with changes to
[this page][plugin-portal-mdx].
### Auth
- [Jenkins](https://plugins.jenkins.io/hashicorp-vault-plugin)
- [Terraform Enterprise/Terraform Cloud](https://github.com/gitrgoliveira/vault-plugin-auth-tfe)
- [SSH](https://github.com/42wim/vault-plugin-auth-ssh)
### Secrets
- [Apigee](https://github.com/bstraehle/vault-plugin-secrets-apigee)
- [AWS Cognito](https://github.com/WealthWizardsEngineering/vault-plugin-secrets-cognito)
- [Ethereum](https://github.com/immutability-io/vault-ethereum)
- [GitHub](https://github.com/martinbaillie/vault-plugin-secrets-github)
- [HashiCorp Boundary](https://github.com/hashicorp-dev-advocates/vault-plugin-boundary-secrets-engine)
- [HashiCorp Waypoint](https://github.com/hashicorp-dev-advocates/vault-plugin-waypoint-secrets-engine)
- [HydrantID PKI Plugin](https://github.com/PaddyPowerBetfair/vault-plugin-hydrant-pki)
- [HSM PKI Plugin](https://github.com/mode51software/vaultplugin-hsmpki)
- [OAuth 2.0/OIDC](https://github.com/puppetlabs/vault-plugin-secrets-oauthapp)
- [Jenkins](https://github.com/circa10a/vault-plugin-secrets-jenkins)
- [Harbor Robot Account](https://github.com/manhtukhang/vault-plugin-harbor)
[github-issue]: https://github.com/hashicorp/vault/issues/new?assignees=&labels=ecosystem%2Fplugin&template=plugin-submission.md&title=%5BPlugin+Portal%5D+Plugin+Submission+-+%3CPLUGIN+NAME%3E
[plugin-portal-mdx]: https://github.com/hashicorp/vault/blob/main/website/content/docs/plugins/plugin-portal.mdx