1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
2021-12-13 14:27:15 -06:00
.github Bump actions/cache from 2.1.6 to 2.1.7 2021-11-29 08:05:28 +00:00
apis Merge branch 'main' into ibm-enable-retries 2021-12-13 13:27:57 -06:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy Merge branch 'main' into ibm-enable-retries 2021-12-13 13:27:57 -06:00
design docs: Fix documentation for externalsecret dataFrom 2021-05-28 16:12:12 +02:00
docs Merge branch 'main' into ibm-enable-retries 2021-12-13 13:27:57 -06:00
e2e chore: replace alpine by distroless 2021-12-06 14:17:24 +01:00
hack update docs 2021-11-15 21:24:03 +02:00
pkg Some quick lint fixes. 2021-12-13 14:27:15 -06:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore feat: add arm build 2021-07-21 23:44:53 +02:00
.golangci.yaml Replace deprecated golangci-lint checkers. 2021-10-27 17:01:15 -05:00
changelog.json feat: helm release workflow 2021-05-03 22:12:39 +02:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile chore: replace alpine by distroless 2021-12-06 14:17:24 +01:00
go.mod chore: bump gjson and go-jwt 2021-12-13 13:15:18 +01:00
go.sum chore: bump gjson and go-jwt 2021-12-13 13:15:18 +01:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go fix: dependent kind=secret are not recreated in case of deletion. (#349) 2021-09-09 11:14:17 +02:00
Makefile Upgrade golangci-lint and change install script. 2021-10-27 16:35:55 -05:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md Promote aws and gcp to beta 2021-11-29 12:57:04 +01:00
RELEASE.md feat: helm release workflow 2021-05-03 22:12:39 +02:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Bump e2e kind & tools versions, remove dep on ginkgo on path 2021-11-06 15:20:40 -05:00

External Secrets


The External Secrets Operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

Supported Backends

Stability and Support Level

Internally maintained:

Provider Stability Contact
AWS SM beta ESO Org
AWS PS beta ESO Org
Hashicorp Vault stable ESO Org
GCP SM beta ESO Org

Community maintained:

Provider Stability Contact
Azure KV alpha @ahmedmus-1A @asnowfix @ncourbet-1A @1A-mj
IBM SM alpha @knelasevero @sebagomez @ricardoptcosta
Yandex Lockbox alpha @AndreyZamyslov @knelasevero
Gitlab Project Variables alpha @Jabray5
Alibaba Cloud KMS alpha @ElsaChelala
Oracle Vault alpha @KianTigger
Akeyless alpha @renanaAkeyless

Documentation

External Secrets Operator guides and reference documentation is available at external-secrets.io.

Support

You can use GitHub's issues to report bugs/suggest features or use GitHub's discussions to ask for help and figure out problems. You can also reach us at our KES and ESO shared channel in Kubernetes slack.

Even though we have active maintainers and people assigned to this project, we kindly ask for patience when asking for support. We will try to get to priority issues as fast as possible, but there may be some delays.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Security

Please report vulnerabilities by email to contact@external-secrets.io, also see our security policy for details.

Kicked off by