GitHub Secrets can be used to store sensitive information. They are translated into environment variables in the Terrateam GitHub Action runtime environment. These environment variables may be referenced in your Terraform code.
Your secrets never touch our servers outside of Terraform plan files.
Prerequisites: GitHub CLI
- Export your Terraform
organization/repocombination as an environment variable.
- Create a new repository secret
gh secret --repo "$REPO" set SECRET_NAME
Navigate to the main page of your Terraform repository on GitHub
- In the left sidebar, select
Secrets → Actions
New repository secret
- Add your new secret