No Description

Daniel Quackenbush b441112587 :books: update references to select "main" instead of "master" (#1346) 3 years ago
.github 302ad8c9a0 :arrow_up: Bump azure/setup-helm from 3.0 to 3.1 (#1363) 3 years ago
apis 4affcb7345 🐛Clarify CAProvider usage in struct annotations (#1397) 3 years ago
assets c9731b259c chore: add pento to sponsors 4 years ago
cmd 4369b507e3 🐛Configure cache and throttle options (#1380) 3 years ago
config 9c09b936b1 build(deps): bump sigs.k8s.io/controller-tools from 0.9.0 to 0.9.2 (#1322) 3 years ago
deploy b441112587 :books: update references to select "main" instead of "master" (#1346) 3 years ago
design 4db9017d2e 🗺️ Design for dataFrom key rewrite (#1188) 3 years ago
docs 39a51fbead feat(helm): adds new flags to create metrics services for other scrapers (#1392) 3 years ago
e2e fa91ba0f6c :sparkles: Adds DecodingStrategy to ExternalSecrets (#1294) 3 years ago
hack b441112587 :books: update references to select "main" instead of "master" (#1346) 3 years ago
overrides 7581b00d4c Using new syntax for overrides 4 years ago
pkg fdf1f9ce6f feat: Add support for container auth to IBM provider. (#1177) 3 years ago
terraform 22601c520d Adds service account with Worload identity annotations 3 years ago
.dockerignore 3658afd0a2 ✨Add standalone Dockerfile (#1328) 3 years ago
.editorconfig 987d499241 cleanup: add lint and editorconfig 5 years ago
.gitignore 8e0a5b96c6 ArgoCD & Flux e2e suites (#1041) 3 years ago
.golangci.yaml 80fac0f697 feat: add gcp workload identity via SA 4 years ago
ADOPTERS.md d32e098482 Adopters list reordered to follow alphabetical order (#1293) 3 years ago
CNAME 90286f37a4 Create CNAME 5 years ago
Dockerfile 8a99845d70 chore: replace alpine by distroless 4 years ago
Dockerfile.standalone 3658afd0a2 ✨Add standalone Dockerfile (#1328) 3 years ago
LICENSE 59a364e04d initial commit 5 years ago
Makefile 1da44c7fb0 feat: add kustomization file to config/crds/bases folder (#1274) 3 years ago
PROJECT 324c7def06 feat: implement ClusterExternalSecret (#542) 4 years ago
README.md c9731b259c chore: add pento to sponsors 4 years ago
SECURITY.md 25b3f4dd83 feat: security policy & dependabot (#60) 5 years ago
changelog.json 771334dee9 feat: helm release workflow 5 years ago
go.mod 9c09b936b1 build(deps): bump sigs.k8s.io/controller-tools from 0.9.0 to 0.9.2 (#1322) 3 years ago
go.sum 9c09b936b1 build(deps): bump sigs.k8s.io/controller-tools from 0.9.0 to 0.9.2 (#1322) 3 years ago
main.go 2e6017dd4b Using cobra commands instead of several binaries 4 years ago
tools.go 008268ee00 feat(e2e): implement aws tests, enhance gcp tests 4 years ago

README.md

external-secrets

External Secrets

ci CII Best Practices Go Report Card Artifact Hub operatorhub.io

External Secrets Operator is a Kubernetes operator that integrates external secret management systems like AWS Secrets Manager, HashiCorp Vault, Google Secrets Manager, Azure Key Vault and many more. The operator reads information from external APIs and automatically injects the values into a Kubernetes Secret.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io. Also see our stability and support policy.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Sponsoring

Please consider sponsoring this project, there are many ways you can help us with: engineering time, providing infrastructure, donating money, etc. We are open to cooperations, feel free to approach as and we discuss how this could look like. We can keep your contribution anonymized if that's required (depending on the type of contribution), and anonymous donations are possible inside Opencollective.

Bi-weekly Development Meeting

We host our development meeting every odd wednesday at 5:30 PM Berlin Time on Jitsi. Meeting notes are recorded on hackmd.

Anyone is welcome to join. Feel free to ask questions, request feedback, raise awareness for an issue or just say hi ;)

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Adopters

Please create a PR and add your company or your project to our ADOPTERS file if you are using our project!

Kicked off by

Sponsored by