GitHub Actions runners are Node-capable containers. You can runDocumentation Index
Fetch the complete documentation index at: https://docs.capy.sc/llms.txt
Use this file to discover all available pages before exploring further.
capy run in any workflow step that needs decrypted secrets - builds, tests, deploys, anything that reads process.env.
Workflow
CAPY_SECRETS_BLOBCAPY_PROJECT_KEY
gh secret set:
One job, one decrypt
Every step under the job’senv: block inherits SECRETS_BLOB and PROJECT_KEY. Each capy run invocation does its own service fetch, but the job-level env means you don’t have to pass them per step.
If you want to share a single decryption across steps, run capy run once to produce a file and have subsequent steps read it. Example for Next.js builds that produce a .capy/next-env.js manifest:
Per-environment secrets
For deploys that target multiple environments (production, staging), use GitHub’s environment secrets. Each environment has its ownCAPY_SECRETS_BLOB and CAPY_PROJECT_KEY, so the same workflow deploys different secrets to different targets based on environment: in the job.
Pull requests from forks
By default, GitHub Actions doesn’t pass secrets to workflows triggered by PRs from forks - a security baseline. That means forked-PR builds can’t decrypt with Capy. Usually fine: run CI without decrypted secrets, use mock values, or gate deploy jobs ongithub.event.pull_request.head.repo.full_name == github.repository.