On This Page

  • Docs
  • Features
  • Secrets


GitHub Secrets can be used to store sensitive information. They are translated into environment variables in the Terrateam GitHub Action runtime environment. These environment variables may be referenced in your Terraform code.

Your secrets never touch our servers outside of Terraform plan files.

Creating Secrets

Prerequisites: GitHub CLI

  1. Export your Terraform organization/repo combination as an environment variable.

For example:

  1. Create a new repository secret
gh secret --repo "$REPO" set SECRET_NAME
  1. Navigate to the main page of your Terraform repository on GitHub

  2. Select Settings

GitHub Settings Tab

  1. In the left sidebar, select Secrets → Actions

GitHub Secrets Actions

  1. Select New repository secret

GitHub Actions Secrets New Repository Secret

  1. Add your new secret

GitHub Actions Add Secret