No Description

Moritz Johner 92be45df6a add awssm support (#34) 5 years ago
.github a7a074dd02 feat: initial helm chart 5 years ago
apis 92be45df6a add awssm support (#34) 5 years ago
assets e0e824967d Tidy image 5 years ago
config 92be45df6a add awssm support (#34) 5 years ago
deploy a7a074dd02 feat: initial helm chart 5 years ago
hack ffd4a220d1 chore: remove newlines from license boilerplate 5 years ago
pkg 92be45df6a add awssm support (#34) 5 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore a7a074dd02 feat: initial helm chart 5 years ago
.golangci.yaml 987d499241 cleanup: add lint and editorconfig 5 years ago
Dockerfile 3506b6fe85 fix: update go/dockerfile 1.15 5 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 35f52ca1f5 fix: improve portability of Makefile 5 years ago
PROJECT 2e0a6effbe convert to multi-api 5 years ago
README.md e0e824967d Tidy image 5 years ago
go.mod 92be45df6a add awssm support (#34) 5 years ago
go.sum 92be45df6a add awssm support (#34) 5 years ago
main.go 92be45df6a add awssm support (#34) 5 years ago

README.md

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Kicked off by