Secrets
Store encrypted credentials and reference them in job headers.
Secrets let you store sensitive values (API keys, tokens, passwords) that your jobs need without hardcoding them in job definitions.
How secrets work
- You create a secret with a name and value.
- TrigRun encrypts the value with AES-256-GCM and stores only the ciphertext.
- In job headers, you reference the secret as
secret://name. - At execution time, TrigRun decrypts and substitutes the value before making the HTTP request.
- Secret values are never returned by the API — only names and metadata are visible.
Creating a secret
Notice the response does not include the value. Once stored, secret values cannot be retrieved — only replaced by creating a new secret with the same name.
Using secrets in job headers
Reference secrets with secret:// syntax:
At execution time, secret://stripe-key is replaced with the decrypted value of the stripe-key secret.
You can use multiple secrets in the same job:
Listing secrets
Values are never returned. You see only the name, environment, and creation time.
Updating a secret
To update a secret's value, delete the old one and create a new one with the same name. Secret names are unique within a workspace.
Jobs referencing secret://stripe-key will use the new value on their next execution.
Deleting a secret
If a job references a deleted secret, the secret://name placeholder will not be resolved at execution time — the literal string secret://name will be sent as the header value. Make sure to update or pause affected jobs.