1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
External Secrets Operator reads information from a third-party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.
Find a file
2021-04-19 13:26:29 -05:00
.github Merge pull request #111 from external-secrets/dependabot/github_actions/actions/cache-v2.1.5 2021-04-14 20:24:29 +00:00
apis Add service account selector to vault provider to look up the sa token 2021-04-19 13:26:29 -05:00
assets Tidy image 2021-02-10 15:29:46 +01:00
deploy Add service account selector to vault provider to look up the sa token 2021-04-19 13:26:29 -05:00
docs Update getting started guide 2021-04-08 13:56:34 -05:00
hack Fix typo in doc site yaml 2021-03-06 17:56:00 -05:00
pkg Add service account selector to vault provider to look up the sa token 2021-04-19 13:26:29 -05:00
.editorconfig cleanup: add lint and editorconfig 2020-12-21 14:38:48 -05:00
.gitignore feat: add docs (#39) 2021-03-01 08:31:02 +01:00
.golangci.yaml Add vault provider implementation 2021-03-26 03:36:48 -05:00
CNAME Create CNAME 2021-03-05 18:26:07 +01:00
Dockerfile Improve primary CI pipeline and refactor Makefile 2021-02-25 05:01:57 -05:00
go.mod chore(deps): bump sigs.k8s.io/controller-tools from 0.4.1 to 0.5.0 2021-04-14 20:39:39 +00:00
go.sum chore(deps): bump sigs.k8s.io/controller-tools from 0.4.1 to 0.5.0 2021-04-14 20:39:39 +00:00
LICENSE initial commit 2020-11-19 16:34:16 +01:00
main.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00
Makefile Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00
PROJECT convert to multi-api 2020-12-29 12:25:08 -05:00
README.md Add CoC and references to it 2021-03-05 16:36:22 +01:00
SECURITY.md feat: security policy & dependabot (#60) 2021-03-17 08:32:32 +01:00
tools.go Cleanup and remove kustomize manifests in favor of Helm chart 2021-04-08 13:56:11 -05:00

External Secrets


The External Secrets Kubernetes operator reads information from a third party service like AWS Secrets Manager and automatically injects the values as Kubernetes Secrets.

Multiple people and organizations are joining efforts to create a single External Secrets solution based on existing projects. If you are curious about the origins of this project, check out this issue and this PR.

⚠️ Please bear in mind

While this project is not ready, you might consider using the following:

Installation

Clone this repository:

git clone https://github.com/external-secrets/external-secrets.git

Install the Custom Resource Definitions:

make install

Run the controller against the active Kubernetes cluster context:

make run

Apply the sample resources:

kubectl apply -f config/samples/external-secrets_v1alpha1_secretstore.yaml
kubectl apply -f config/samples/external-secrets_v1alpha1_externalsecret.yaml

We will add more documentation once we have the implementation for the different providers.

Planned Features

  • Support to multiple Provider stores (AWS Secret Manager, GCP Secret Manger, Vault and more) simultaneously.
  • Multiple External Secrets operator instances for different contexts/environments.
  • A custom refresh interval to sync the data from the Providers, syncing your Kubernetes Secrets up to date.
  • Select specific versions of the Provider data.

Contributing

We welcome and encourage contributions to this project! Please read the Developer and Contribution process guides. Also make sure to check the Code of Conduct and adhere to its guidelines.

Kicked off by