Skip to content

Commit c442b71

Browse files
committed
.
1 parent 261ea08 commit c442b71

File tree

4 files changed

+46
-4
lines changed

4 files changed

+46
-4
lines changed

docs/docs.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@
2828
{
2929
"group": "Integrations",
3030
"pages": [
31+
"integrations/github",
3132
"integrations/slack",
3233
"integrations/linear",
33-
"integrations/github",
3434
"integrations/notion",
3535
"integrations/figma",
3636
"integrations/circleci",
@@ -43,8 +43,9 @@
4343
"pages": [
4444
"sandboxes/overview",
4545
"sandboxes/setup-commands",
46-
"sandboxes/editor",
4746
"sandboxes/environment-variables",
47+
"sandboxes/secrets",
48+
"sandboxes/editor",
4849
"sandboxes/web-preview"
4950
]
5051
},

docs/introduction/api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Codegen SDK"
33
sidebarTitle: "API"
4-
icon: "code"
4+
icon: "bolt"
55
iconType: "solid"
66
---
77

docs/sandboxes/editor.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Remote Editor (VSCode)"
33
sidebarTitle: "Editor"
4-
icon: "pencil"
4+
icon: "laptop-code"
55
---
66

77
Codegen provides access to a remote VSCode editor instance that is directly connected to your active sandbox environment. This powerful feature allows for real-time interaction with the agent's workspace, offering capabilities for live debugging, manual intervention, and detailed progress monitoring.

docs/sandboxes/secrets.mdx

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: "Repository Secrets"
3+
sidebarTitle: "Secrets"
4+
icon: "key"
5+
---
6+
7+
Manage environment variables and secrets for your repository. These are securely injected into the agent's sandbox environment during code execution.
8+
9+
<Warning>
10+
Only use staging credentials and non-production secrets. Never store
11+
production API keys, database passwords, or sensitive credentials.
12+
</Warning>
13+
14+
## How Secrets Work
15+
16+
Repository secrets are environment variables that get automatically injected into the sandbox when agents execute code:
17+
18+
- **Secure Storage:** Secrets are encrypted and stored securely per repository
19+
- **Sandbox Injection:** Automatically available as environment variables during agent execution
20+
- **Development Support:** Enable agents to run dev servers, connect to staging databases, and test integrations
21+
22+
## Common Use Cases
23+
24+
- **Development Server Credentials:** API keys for staging services and development APIs
25+
- **Database Connections:** Connection strings for staging/test databases
26+
- **Third-Party Integrations:** Non-production tokens for services like Stripe test mode, staging analytics
27+
- **Build Configuration:** Environment-specific build variables and feature flags
28+
29+
## Managing Secrets
30+
31+
Add secrets through your repository settings:
32+
33+
1. Navigate to your repository settings
34+
2. Go to the Secrets tab
35+
3. Add key-value pairs for your environment variables
36+
4. Secrets are immediately available to agents in the sandbox
37+
38+
<Note>
39+
Agents can access these secrets when running code, starting development
40+
servers, or executing tests that require environment configuration.
41+
</Note>{" "}

0 commit comments

Comments
 (0)