1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
2021-08-17 19:30:05 +03:00
.github chore(deps): bump fkirc/skip-duplicate-actions from 3.4.0 to 3.4.1 2021-08-09 08:04:12 +00:00
apis Add support for Yandex Lockbox 2021-08-12 20:05:02 +03:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy Add support for Yandex Lockbox 2021-08-12 20:05:02 +03:00
design docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
docs docs(ibm): add note for the /api suffix 2021-08-07 16:03:29 +02:00
e2e feat: add vault e2e tests 2021-08-06 22:25:55 +02:00
hack docs: more examples os specific k8s secret types 2021-07-14 22:10:33 +02:00
pkg Add support for Yandex Lockbox: tests 2021-08-17 19:30:05 +03:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore fixing conflicts and pulling changes 2021-07-29 11:43:57 +01:00
.golangci.yaml Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile fixing conflicts and pulling changes 2021-07-29 11:43:57 +01:00
go.mod Add support for Yandex Lockbox 2021-08-12 20:05:02 +03:00
go.sum Add support for Yandex Lockbox 2021-08-12 20:05:02 +03:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: zero refreshInterval shouldn't sync 2021-08-02 22:48:13 +02:00
Makefile fixing conflicts and pulling changes 2021-07-29 11:43:57 +01:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md docs: ibm provider 2021-07-02 16:00:05 +02:00
RELEASE.md feat: helm release workflow 2021-05-03 22:12:39 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM alpha ESO Org
AWS PS alpha ESO Org
Hashicorp Vault alpha ESO Org
GCP SM alpha ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by