Zum Inhalt springen
Actionforge
Open
Discord Download
Docs
Open

Secrets & Vault

Dieser Inhalt ist noch nicht in deiner Sprache verfügbar.

The Orchestrator provides secrets management at three levels: personal, organization, and repository. Secrets are injected into pipeline runs and are never exposed in logs or the UI.

Navigate to the secrets page for the scope you need:

  • Personal: Settings → Secrets
  • Organization: Organization Settings → Secrets
  • Repository: Project Settings → Secrets

Click Add Secret, enter a key name (e.g. NPM_TOKEN, DEPLOY_KEY) and its value.

When the same key exists at multiple levels, the most specific scope wins:

  1. Repository secrets (highest priority)
  2. Organization secrets
  3. Personal secrets (lowest priority)

Secret values are write-only. You can see which keys are configured but never view the values. You can update a secret’s value by setting it again with the same key, or delete it permanently.

For teams that use HashiCorp Vault, the Orchestrator supports three integration modes:

The orchestrator manages secrets in its own storage. No external Vault is needed. This is the default.

The orchestrator connects to your Vault instance and proxies secret requests on behalf of agents. Agents never access Vault directly.

Agent → Orchestrator → Vault

Agents connect to Vault directly during job execution. The orchestrator stores the Vault configuration but doesn’t proxy requests.

Agent → Vault (direct)

Configure Vault from the settings page at the appropriate scope (Settings → Vault, Organization Settings → Vault, or Project Settings → Vault).

Provide the following:

FieldDescription
Vault addressURL of your Vault instance (e.g. https://vault.example.com)
Auth methodToken or AppRole
Mount pathSecret engine mount (e.g. secret)
PathPath within the mount (e.g. ci/myproject)
NamespaceOptional Vault namespace

For Token auth, provide the Vault token. For AppRole, provide the Role ID and Secret ID.

Use the Test Connection button to validate your configuration before saving.

Organization admins can enforce a vault mode across all projects from Organization Settings → Security Policy. When set to non-overridable, individual repositories cannot change the vault mode. See Organizations for details.

For programmatic secrets management, see REST API.