No Description

Lucas Severo Alves 8c79f1458c Fix reconciler name typo 5 years ago
.github a7a074dd02 feat: initial helm chart 5 years ago
apis 3227e730f1 Change dir structure and adapt 5 years ago
assets 52fc65aeef Bootstrap project 5 years ago
config 3227e730f1 Change dir structure and adapt 5 years ago
deploy 3227e730f1 Change dir structure and adapt 5 years ago
hack ffd4a220d1 chore: remove newlines from license boilerplate 5 years ago
pkg 04f3dd4119 Merge branch 'main' into add-main-controller-logic 5 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore a7a074dd02 feat: initial helm chart 5 years ago
.golangci.yaml 987d499241 cleanup: add lint and editorconfig 5 years ago
Dockerfile 3227e730f1 Change dir structure and adapt 5 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 35f52ca1f5 fix: improve portability of Makefile 5 years ago
PROJECT 3227e730f1 Change dir structure and adapt 5 years ago
README.md 5e3c3e8d3f Fix README examples and resource samples 5 years ago
go.mod 31618e0d0c Add changes to go mod after running `go mod tidy` 5 years ago
go.sum 31618e0d0c Add changes to go mod after running `go mod tidy` 5 years ago
main.go 8c79f1458c Fix reconciler name typo 5 years ago

README.md

External Secrets

The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Kicked off by