No Description

Alexander Chernov 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago
.github f2dd729e55 chore(deps): bump peter-evans/slash-command-dispatch from 2.2.1 to 2.3.0 4 years ago
apis 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago
assets e0e824967d Tidy image 5 years ago
deploy db5b4c5044 eat: add status printcolumn to ES CRD (#318) 4 years ago
design c8559c1be7 docs: Fix documentation for externalsecret dataFrom 4 years ago
docs 45630062d6 docs: add more steps to dev guide 4 years ago
e2e 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago
hack 7ba21661ba added gitlab provider docs 4 years ago
pkg 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore 7a86987791 feat: add arm build 4 years ago
.golangci.yaml 8c8064e0e1 Draft: feat: implement template (#69) 5 years ago
CNAME 90286f37a4 Create CNAME 5 years ago
Dockerfile 197da6feca chore(deps): bump alpine from 3.14.1 to 3.14.2 4 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile d537517cb8 Merge pull request #276 from external-secrets/feature/add-arm-builds 4 years ago
PROJECT 2e0a6effbe convert to multi-api 5 years ago
README.md 3267636be2 docs: alibaba in readme 4 years ago
RELEASE.md 771334dee9 feat: helm release workflow 5 years ago
SECURITY.md 25b3f4dd83 feat: security policy & dependabot (#60) 5 years ago
changelog.json 771334dee9 feat: helm release workflow 5 years ago
go.mod db5b4c5044 eat: add status printcolumn to ES CRD (#318) 4 years ago
go.sum db5b4c5044 eat: add status printcolumn to ES CRD (#318) 4 years ago
main.go 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago
tools.go 280964f84e fix: dependent kind=secret are not recreated in case of deletion. (#349) 4 years ago

README.md

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM alpha ESO Org
AWS PS alpha ESO Org
Hashicorp Vault alpha ESO Org
GCP SM alpha ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta
Yandex Lockbox alpha @AndreyZamyslov @knelasevero
Gitlab Project Variables alpha @Jabray5
Alibaba Cloud KMS alpha @ElsaChelala

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by