open-vault/website/content/api-docs/system/plugins-catalog.mdx

217 lines
5.3 KiB
Plaintext
Raw Normal View History

2017-05-03 18:43:24 +00:00
---
layout: api
page_title: /sys/plugins/catalog - HTTP API
description: The `/sys/plugins/catalog` endpoint is used to manage plugins.
2017-05-03 18:43:24 +00:00
---
# `/sys/plugins/catalog`
The `/sys/plugins/catalog` endpoint is used to read, register, update, and
2017-05-03 18:43:24 +00:00
remove plugins in Vault's catalog. Plugins must be registered before use, and
once registered backends can use the plugin by querying the catalog.
## LIST Plugins
2017-05-03 18:43:24 +00:00
This endpoint lists the plugins in the catalog by type.
2017-05-03 18:43:24 +00:00
| Method | Path |
| :----- | :--------------------- |
| `GET` | `/sys/plugins/catalog` |
2017-05-03 18:43:24 +00:00
### Sample Request
```shell-session
2017-05-03 18:43:24 +00:00
$ curl \
--header "X-Vault-Token: ..." \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/plugins/catalog
2017-05-03 18:43:24 +00:00
```
### Sample Response
```javascript
{
"data": {
"auth": [
"aws",
"azure",
"custom-auth-plugin",
"gcp",
"ldap"
],
"database": [
2017-05-03 18:43:24 +00:00
"cassandra-database-plugin",
"mssql-database-plugin",
"mysql-database-plugin",
"postgresql-database-plugin"
],
"secret": [
"ad",
"aws",
"azure",
"gcp",
"transit"
]
}
}
```
## LIST Plugins
This endpoint lists the plugins in the catalog by type.
| Method | Path |
| :----- | :------------------------------ |
| `LIST` | `/sys/plugins/catalog/auth` |
| `LIST` | `/sys/plugins/catalog/database` |
| `LIST` | `/sys/plugins/catalog/secret` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
http://127.0.0.1:8200/v1/sys/plugins/catalog/auth
```
### Sample Response
```javascript
{
"data": {
"keys": [
"aws",
"azure",
"custom-auth-plugin",
"gcp",
"ldap"
2017-05-03 18:43:24 +00:00
]
}
}
```
## Register Plugin
This endpoint registers a new plugin, or updates an existing one with the
supplied name.
- **`sudo` required**  This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :----- | :--------------------------------- |
| `POST` | `/sys/plugins/catalog/:type/:name` |
2017-05-03 18:43:24 +00:00
### Parameters
- `name` `(string: <required>)`  Specifies the name for this plugin. The name
is what is used to look up plugins in the catalog. This is part of the request
URL.
- `type` `(string: <required>)`  Specifies the type of this plugin. May be
"auth", "database", or "secret".
2017-05-03 18:43:24 +00:00
- `sha256` `(string: <required>)`  This is the SHA256 sum of the plugin's
2017-05-03 18:43:24 +00:00
binary. Before a plugin is run it's SHA will be checked against this value, if
they do not match the plugin can not be run.
- `command` `(string: <required>)`  Specifies the command used to execute the
plugin. This is relative to the plugin directory. e.g. `"myplugin"`.
- `args` `(array: [])` Specifies the arguments used to execute the plugin. If
the arguments are provided here, the `command` parameter should only contain
the named program. e.g. `"--my_flag=1"`.
- `env` `(array: [])` Specifies the environment variables used during the
execution of the plugin. Each entry is of the form "key=value". e.g
`"FOO=BAR"`.
2017-05-03 18:43:24 +00:00
### Sample Payload
```json
{
"sha256": "d130b9a0fbfddef9709d8ff92e5e6053ccd246b78632fc03b8548457026961e9",
2017-05-03 18:43:24 +00:00
"command": "mysql-database-plugin"
}
```
### Sample Request
```shell-session
2017-05-03 18:43:24 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
2017-05-03 18:43:24 +00:00
--data @payload.json \
http://127.0.0.1:8200/v1/sys/plugins/catalog/secret/example-plugin
2017-05-03 18:43:24 +00:00
```
## Read Plugin
This endpoint returns the configuration data for the plugin with the given name.
- **`sudo` required**  This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :----- | :--------------------------------- |
| `GET` | `/sys/plugins/catalog/:type/:name` |
2017-05-03 18:43:24 +00:00
### Parameters
- `name` `(string: <required>)`  Specifies the name of the plugin to retrieve.
This is part of the request URL.
- `type` `(string: <required>)`  Specifies the type of this plugin. May be
"auth", "database", or "secret".
2017-05-03 18:43:24 +00:00
### Sample Request
```shell-session
2017-05-03 18:43:24 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
http://127.0.0.1:8200/v1/sys/plugins/catalog/secret/example-plugin
2017-05-03 18:43:24 +00:00
```
### Sample Response
```javascript
{
"data": {
"args": [],
"builtin": false,
"command": "/tmp/vault-plugins/mysql-database-plugin",
"name": "example-plugin",
"sha256": "0TC5oPv93vlwnY/5Ll5gU8zSRreGMvwDuFSEVwJpYek="
2017-05-03 18:43:24 +00:00
}
}
```
2017-05-03 18:43:24 +00:00
## Remove Plugin from Catalog
This endpoint removes the plugin with the given name.
- **`sudo` required**  This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :------- | :--------------------------------- |
| `DELETE` | `/sys/plugins/catalog/:type/:name` |
2017-05-03 18:43:24 +00:00
### Parameters
- `name` `(string: <required>)`  Specifies the name of the plugin to delete.
This is part of the request URL.
- `type` `(string: <required>)`  Specifies the type of this plugin. May be
"auth", "database", or "secret".
2017-05-03 18:43:24 +00:00
### Sample Request
```shell-session
2017-05-03 18:43:24 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/sys/plugins/catalog/secret/example-plugin
2017-05-03 18:43:24 +00:00
```