No Description

Lucas Severo Alves 90286f37a4 Create CNAME 5 years ago
.github c6a5deb10e Add paul config file 5 years ago
apis 53cc579ee8 fix: ssm may respond with nil SecretString (#41) 5 years ago
assets e0e824967d Tidy image 5 years ago
config 53cc579ee8 fix: ssm may respond with nil SecretString (#41) 5 years ago
deploy a7a074dd02 feat: initial helm chart 5 years ago
docs 7b883778e9 feat: add docs (#39) 5 years ago
hack 7b883778e9 feat: add docs (#39) 5 years ago
pkg 53cc579ee8 fix: ssm may respond with nil SecretString (#41) 5 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore 7b883778e9 feat: add docs (#39) 5 years ago
.golangci.yaml 987d499241 cleanup: add lint and editorconfig 5 years ago
CNAME 90286f37a4 Create CNAME 5 years ago
Dockerfile b4b1f892c5 Improve primary CI pipeline and refactor Makefile 5 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 7b883778e9 feat: add docs (#39) 5 years ago
PROJECT 2e0a6effbe convert to multi-api 5 years ago
README.md 7b883778e9 feat: add docs (#39) 5 years ago
go.mod 53cc579ee8 fix: ssm may respond with nil SecretString (#41) 5 years ago
go.sum 7b883778e9 feat: add docs (#39) 5 years ago
main.go 92be45df6a add awssm support (#34) 5 years ago

README.md

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Kicked off by