No Description

Moritz Johner 640978ca9e feat: awssm refactoring (#57) 5 years ago
.github e6229b173a Add cname to docs action 5 years ago
apis 640978ca9e feat: awssm refactoring (#57) 5 years ago
assets e0e824967d Tidy image 5 years ago
config 640978ca9e feat: awssm refactoring (#57) 5 years ago
deploy a7a074dd02 feat: initial helm chart 5 years ago
docs 640978ca9e feat: awssm refactoring (#57) 5 years ago
hack 53ae29e8ce Fix typo in doc site yaml 5 years ago
pkg 640978ca9e feat: awssm refactoring (#57) 5 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore 7b883778e9 feat: add docs (#39) 5 years ago
.golangci.yaml 987d499241 cleanup: add lint and editorconfig 5 years ago
CNAME 90286f37a4 Create CNAME 5 years ago
Dockerfile b4b1f892c5 Improve primary CI pipeline and refactor Makefile 5 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 7b883778e9 feat: add docs (#39) 5 years ago
PROJECT 2e0a6effbe convert to multi-api 5 years ago
README.md aab243e712 Add CoC and references to it 5 years ago
go.mod 53cc579ee8 fix: ssm may respond with nil SecretString (#41) 5 years ago
go.sum 7b883778e9 feat: add docs (#39) 5 years ago
main.go 92be45df6a add awssm support (#34) 5 years ago

README.md

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Kicked off by