No Description

Kellin McAvoy 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
.github 7be249ba63 Add vault provider implementation 5 years ago
apis 7be249ba63 Add vault provider implementation 5 years ago
assets e0e824967d Tidy image 5 years ago
deploy 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
docs 2c059b71ba feat: add ssm parameter store support (#59) 5 years ago
hack 53ae29e8ce Fix typo in doc site yaml 5 years ago
pkg 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore 7b883778e9 feat: add docs (#39) 5 years ago
.golangci.yaml 7be249ba63 Add vault provider implementation 5 years ago
CNAME 90286f37a4 Create CNAME 5 years ago
Dockerfile b4b1f892c5 Improve primary CI pipeline and refactor Makefile 5 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
PROJECT 2e0a6effbe convert to multi-api 5 years ago
README.md aab243e712 Add CoC and references to it 5 years ago
SECURITY.md 25b3f4dd83 feat: security policy & dependabot (#60) 5 years ago
go.mod 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
go.sum 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
main.go 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago
tools.go 6318811108 Cleanup and remove kustomize manifests in favor of Helm chart 5 years ago

README.md

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Kicked off by