1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
2021-04-28 10:28:19 -05:00
.github Merge pull request #111 from external-secrets/dependabot/github_actions/actions/cache-v2.1.5 2021-04-14 20:24:29 +00:00
apis Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
docs Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
hack Add first iteration of custom metrics 2021-04-12 17:07:43 +02:00
pkg Merge pull request #119 from cnmcavoy/cnmcavoy/vault-cluster-secret-store 2021-04-27 15:49:49 +00:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore feat: add docs (#39) 2021-03-01 08:31:02 +01:00
.golangci.yaml Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile Improve primary CI pipeline and refactor Makefile 2021-02-25 05:01:57 -05:00
go.mod chore(deps): bump github.com/tidwall/gjson from 1.7.4 to 1.7.5 2021-04-26 08:08:19 +00:00
go.sum chore(deps): bump github.com/tidwall/gjson from 1.7.4 to 1.7.5 2021-04-26 08:08:19 +00:00
LICENSE Merge branch 'main' of https://github.com/external-secrets/crd-spec into crd-spec 2021-04-28 10:28:19 -05:00
main.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00
Makefile Draft: feat: implement template (#69) 2021-04-23 08:22:23 +02:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md Add CoC and references to it 2021-03-05 16:36:22 +01:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
Spec.md chore: refactor aws store spec (#7) 2021-03-23 17:38:31 +01:00
tools.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Kicked off by