1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
renanaAkeyless 34ea6f21be update docs
2021-11-15 21:24:03 +02:00
.github Rollback actions/github-script until we figure it out 2021-11-10 16:13:39 +01:00
apis Update zz_generated.deepcopy.go 2021-11-09 21:14:53 +02:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy lint 2021-11-08 13:27:12 +02:00
design docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
docs update docs 2021-11-15 21:24:03 +02:00
e2e Merge branch 'external-secrets:main' into main 2021-11-10 17:18:51 +02:00
hack update docs 2021-11-15 21:24:03 +02:00
pkg Merge branch 'external-secrets:main' into main 2021-11-09 20:43:31 +02:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore feat: add arm build 2021-07-21 23:44:53 +02:00
.golangci.yaml Replace deprecated golangci-lint checkers. 2021-10-27 17:01:15 -05:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore(deps): bump alpine from 3.14.1 to 3.14.2 2021-08-30 08:02:39 +00:00
go.mod lint 2021-11-08 13:27:12 +02:00
go.sum Merge branch 'external-secrets:main' into main 2021-11-09 20:43:31 +02:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: dependent kind=secret are not recreated in case of deletion. (#349) 2021-09-09 11:14:17 +02:00
Makefile Upgrade golangci-lint and change install script. 2021-10-27 16:35:55 -05:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md Update README.md 2021-11-07 22:21:27 +02:00
RELEASE.md feat: helm release workflow 2021-05-03 22:12:39 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Bump e2e kind & tools versions, remove dep on ginkgo on path 2021-11-06 15:20:40 -05:00

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM alpha ESO Org
AWS PS alpha ESO Org
Hashicorp Vault alpha ESO Org
GCP SM alpha ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta
Yandex Lockbox alpha @AndreyZamyslov @knelasevero
Gitlab Project Variables alpha @Jabray5
Alibaba Cloud KMS alpha @ElsaChelala
Oracle Vault alpha @KianTigger
Akeyless alpha @renanaAkeyless

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by