1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
Sebastián Gómez cef547e473
fix: unmarshal JSON error when empty secrets in Vault (#1512)
Signed-off-by: Sebastián Gómez <sebastiangomezcorrea@gmail.com>
2022-09-14 22:26:10 +02:00
.github chore(deps): bump actions/setup-python from 3.1.2 to 4.2.0 (#1542) 2022-09-13 07:30:34 +02:00
apis added akeyless k8s auth option (#1531) 2022-09-11 13:25:29 +02:00
assets chore: add pento to sponsors 2022-04-29 20:58:09 +02:00
cmd fix: aws parameter store json decode, bump go 1.19 (#1525) 2022-09-06 19:46:36 +02:00
config/crds/bases added akeyless k8s auth option (#1531) 2022-09-11 13:25:29 +02:00
deploy added akeyless k8s auth option (#1531) 2022-09-11 13:25:29 +02:00
design 🗺️ Design for dataFrom key rewrite (#1188) 2022-07-22 13:15:11 -03:00
docs added akeyless k8s auth option (#1531) 2022-09-11 13:25:29 +02:00
e2e chore: refactor provider (#1529) 2022-09-12 14:55:46 +02:00
hack feat: add support matrix, refactor docs (#1508) 2022-09-01 09:53:22 +02:00
overrides Using new syntax for overrides 2022-02-01 15:41:50 -03:00
pkg fix: unmarshal JSON error when empty secrets in Vault (#1512) 2022-09-14 22:26:10 +02:00
terraform Adds service account with Worload identity annotations 2022-06-22 15:14:37 -03:00
.dockerignore Add standalone Dockerfile (#1328) 2022-07-12 05:55:22 -03:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore ArgoCD & Flux e2e suites (#1041) 2022-05-23 16:14:21 +02:00
.golangci.yaml fix: aws parameter store json decode, bump go 1.19 (#1525) 2022-09-06 19:46:36 +02:00
ADOPTERS.md Update ADOPTERS.md (#1503) 2022-08-30 23:37:05 +02:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore: replace alpine by distroless 2021-12-06 14:17:24 +01:00
Dockerfile.standalone chore(deps): bump golang from 1.19.0-alpine to 1.19.1-alpine (#1540) 2022-09-13 08:01:51 +02:00
go.mod chore(deps): bump github.com/aws/aws-sdk-go from 1.44.91 to 1.44.96 (#1550) 2022-09-13 08:47:16 +02:00
go.sum chore(deps): bump github.com/aws/aws-sdk-go from 1.44.91 to 1.44.96 (#1550) 2022-09-13 08:47:16 +02:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: aws parameter store json decode, bump go 1.19 (#1525) 2022-09-06 19:46:36 +02:00
Makefile fix: aws parameter store json decode, bump go 1.19 (#1525) 2022-09-06 19:46:36 +02:00
PROJECT feat: implement ClusterExternalSecret (#542) 2022-03-20 09:32:27 +01:00
README.md DNS transfer to CNCF went , we can remove notice (#1548) 2022-09-12 15:34:27 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go feat(e2e): implement aws tests, enhance gcp tests 2022-01-21 23:37:50 +01:00

external-secrets

External Secrets

ci CII Best Practices Go Report Card Artifact Hub operatorhub.io

External Secrets Operator is a Kubernetes operator that integrates external secret management systems like AWS Secrets Manager, HashiCorp Vault, Google Secrets Manager, Azure Key Vault, Akeyless and many more. The operator reads information from external APIs and automatically injects the values into a Kubernetes Secret.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io. Also see our stability and support policy.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Sponsoring

Please consider sponsoring this project, there are many ways you can help us with: engineering time, providing infrastructure, donating money, etc. We are open to cooperations, feel free to approach as and we discuss how this could look like. We can keep your contribution anonymized if that's required (depending on the type of contribution), and anonymous donations are possible inside Opencollective.

Bi-weekly Development Meeting

We host our development meeting every odd wednesday at 5:30 PM Berlin Time on Jitsi. Meeting notes are recorded on hackmd.

Anyone is welcome to join. Feel free to ask questions, request feedback, raise awareness for an issue or just say hi ;)

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Adopters

Please create a PR and add your company or your project to our ADOPTERS file if you are using our project!

Kicked off by

Sponsored by