Perform CRUD operations with Infisical secrets
infisical secrets
INFISICAL_TOKEN
INFISICAL_DISABLE_UPDATE_CHECK
--expand
true
--projectId
--env
dev
--path
--path
flag indicates which project folder secrets will be injected from.--plain
--plain
flag will output all your secret values without formatting, one per line.--silent
--silent
flag disables output of tip/info messages. Useful when running in scripts or CI/CD pipelines.INFISICAL_DISABLE_UPDATE_CHECK
infisical secrets get
--env
dev
--plain
--plain
flag will output all your requested secret values without formatting, one per line.Default value: false
INFISICAL_DISABLE_UPDATE_CHECK=true
or add the --silent
flag. This will help hide any CLI info/debug output and only show the secret value.--silent
--silent
flag disables output of tip/info messages. Useful when running in scripts or CI/CD pipelines.INFISICAL_DISABLE_UPDATE_CHECK
--raw-value (deprecated)
--plain
instead, as it supports single and multiple secrets.Used to print the plain value of a single requested secret without any table style.Default value: false
Example: infisical secrets get DOMAIN --raw-value
INFISICAL_DISABLE_UPDATE_CHECK=true
or add the --silent
flag. This will help hide any CLI info/debug output and only show the secret value.infisical secrets set
secretName=@path/to/file
to load the secret value from a filesecretName=\@value
if you need the literal ’@’ character at the beginning of your value--env
dev
--path
--type
--file
.env
and YAML
formats. The file path can be either absolute or relative to the current working directory.The file should contain secrets in the following formats:key=value
for .env
fileskey: value
for YAML files# comment
or // comment
. Empty lines will be ignored during processing.infisical secrets delete
--env
dev
--path
--path
flag indicates which project folder secrets will be injected from.infisical secrets folders
get
--path
/
--token
create
--path
/
--name
--path
Default value: “delete
--path
/
--name
--path
Default value: “infisical secrets generate-example-env
DEFAULT:<value>
within your secret’s comment in Infisical. This will result in the specified value being extracted and utilized as the default.--env
dev