1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
2021-07-23 09:27:23 +01:00
.github feat(aws): add jwt authentication 2021-07-17 20:39:24 +02:00
apis feat(aws): add jwt authentication 2021-07-17 20:39:24 +02:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy feat(aws): add jwt authentication 2021-07-17 20:39:24 +02:00
design docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
docs feat(aws): add jwt authentication 2021-07-17 20:39:24 +02:00
e2e Playing around with vault errors 2021-07-23 09:27:23 +01:00
hack docs: more examples os specific k8s secret types 2021-07-14 22:10:33 +02:00
pkg Feature/ibm support more secret types (#271) 2021-07-22 00:07:25 +02:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore chore: refactor parameterstore unit test (#164) 2021-05-28 07:17:54 +02:00
.golangci.yaml Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore(deps): bump alpine from 3.13 to 3.14.0 2021-06-21 08:04:35 +00:00
go.mod Feature/ibm support more secret types (#271) 2021-07-22 00:07:25 +02:00
go.sum Feature/ibm support more secret types (#271) 2021-07-22 00:07:25 +02:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go feat: allow setting loglevel 2021-07-07 21:23:03 +02:00
Makefile fix(e2e): refactor e2e tests 2021-07-12 22:03:59 +02:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md docs: ibm provider 2021-07-02 16:00:05 +02:00
RELEASE.md feat: helm release workflow 2021-05-03 22:12:39 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM alpha ESO Org
AWS PS alpha ESO Org
Hashicorp Vault alpha ESO Org
GCP SM alpha ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by