Find technical information about secrets in GitHub Actions.
Naming your secretsTip
To help ensure that GitHub redacts your secrets in logs correctly, avoid using structured data as the values of secrets.
The following rules apply to secret names:
[a-z]
, [A-Z]
, [0-9]
) or underscores (_
). Spaces are not allowed.GITHUB_
prefix.If a secret with the same name exists at multiple levels, the secret at the lowest level takes precedence. For example, if an organization-level secret has the same name as a repository-level secret, then the repository-level secret takes precedence. Similarly, if an organization, repository, and environment all have a secret with the same name, the environment-level secret takes precedence.
Limits for secretsYou can store up to 1,000 organization secrets, 100 repository secrets, and 100 environment secrets.
A workflow created in a repository can access the following number of secrets:
Secrets are limited to 48 KB in size. To store larger secrets, see Using secrets in GitHub Actions.
When GitHub Actions reads secretsOrganization and repository secrets are read when a workflow run is queued, and environment secrets are read when a job referencing the environment starts.
Automatically redacted secretsGitHub automatically redacts the following sensitive information from workflow logs.
Note
If you would like other types of sensitive information to be automatically redacted, please reach out to us in our community discussions.
ghp
, gho
, ghu
, ghs
, ghr
)For security best practices using secrets, see Secure use reference.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4