Skip to content

secrets

Manage secrets that can be accessed in CI pipeline configurations.

Secrets are encrypted values that can be referenced in your CI pipeline YAML files using the {{ secret “KEY” }} template function. They are useful for storing sensitive data like API tokens, deployment keys, and credentials.

Secrets are scoped to a repository and can only be accessed by users with access to that repository.

Terminal window
pogo secrets

Delete a secret from the repository.

This permanently removes the secret. Any CI pipelines that reference this secret will receive an empty string when accessing it.

Terminal window
pogo secrets delete <key>
  • d
  • rm
  • remove
Terminal window
# Delete a secret
pogo secrets delete OLD_TOKEN
# Using the short alias
pogo secrets d UNUSED_KEY

Get the value of a secret by its key.

This will display the secret value in plain text, so be careful when using this command in shared or recorded terminal sessions.

Terminal window
pogo secrets get <key>
  • g
Terminal window
# Get a secret value
pogo secrets get DEPLOY_TOKEN
# Using the short alias
pogo secrets g API_KEY

List all secrets in the repository.

This shows the keys of all secrets, but not their values for security reasons.

Terminal window
pogo secrets list
  • l
Terminal window
# List all secrets
pogo secrets list
# Using the short alias
pogo secrets l

Set a secret value for the repository.

If a secret with the same key already exists, it will be updated with the new value. Secrets can be used in CI pipeline configurations.

Terminal window
pogo secrets set <key> <value>
  • s
Terminal window
# Set a secret
pogo secrets set DEPLOY_TOKEN abc123xyz
# Update an existing secret
pogo secrets set API_KEY new-key-value
# Using the short alias
pogo secrets s DATABASE_URL postgres://...