1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-15 17:51:01 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
renanaAkeyless 67541a843d e2e
2021-11-07 17:37:22 +02:00
.github Update PAUL.yaml 2021-10-27 12:25:28 +01:00
apis Adde Akeyless 2021-11-07 16:18:40 +02:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy deplay 2021-11-07 16:30:20 +02:00
design docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
docs Adde Akeyless 2021-11-07 16:18:40 +02:00
e2e e2e 2021-11-07 17:37:22 +02:00
hack Fixing doc and lint issues. Adding necessary documentation 2021-09-02 16:06:52 +01:00
pkg Adde Akeyless 2021-11-07 16:18:40 +02:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore feat: add arm build 2021-07-21 23:44:53 +02:00
.golangci.yaml Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore(deps): bump alpine from 3.14.1 to 3.14.2 2021-08-30 08:02:39 +00:00
go.mod Adde Akeyless 2021-11-07 16:18:40 +02:00
go.sum Adde Akeyless 2021-11-07 16:18:40 +02:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: dependent kind=secret are not recreated in case of deletion. (#349) 2021-09-09 11:14:17 +02:00
Makefile Update Makefile 2021-10-25 22:12:11 +01:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md Adde Akeyless 2021-11-07 16:18:40 +02:00
RELEASE.md feat: helm release workflow 2021-05-03 22:12:39 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go fix: dependent kind=secret are not recreated in case of deletion. (#349) 2021-09-09 11:14:17 +02:00

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM alpha ESO Org
AWS PS alpha ESO Org
Hashicorp Vault alpha ESO Org
GCP SM alpha ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta
Yandex Lockbox alpha @AndreyZamyslov @knelasevero
Gitlab Project Variables alpha @Jabray5
Alibaba Cloud KMS alpha @ElsaChelala
Oracle Vault alpha @KianTigger
Akeyless alpha @renanaAkeyless

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by