Skip to content

Configuring Secrets

Bucky uses secrets in two contexts: the code review workflow (GitHub Actions) and session pods (EKS). Each has its own mechanism.

The code review workflow runs on GitHub Actions and authenticates with external services using GitHub secrets.

Set these in Settings > Secrets and variables > Actions > Repository secrets:

SecretPurpose
SOURCEGRAPH_TOKENCode search via Sourcegraph MCP

These are set at the GitHub org level and inherited by all repos. They’re already configured at Fetch — you don’t need to set them.

VariablePurpose
BUCKY_APP_IDGitHub App ID for cross-repo access
BUCKY_APP_PRIVATE_KEYGitHub App private key
BUCKY_IAM_ROLEAWS IAM role ARN for Bedrock authentication
ARTIFACTORY_NPM_PROD_TOKENNPM registry token (web preset)
ARTIFACTORY_GOPROXYGo proxy URL (golang preset)
ARTIFACTORY_PROD_REPONPM registry URL (web preset)
BUF_ACCESS_TOKEN_SECRET_ARNBuf token ARN for protobuf (web preset)

Session pods receive credentials from the agent service directly — they don’t use GitHub Actions secrets. To inject your own secrets into session pods, use sm:// references in .bucky/config.yaml:

version: 1
env:
DATABASE_URL: "postgres://localhost:5432/mydb" # plain value
MY_API_KEY: "sm://my-team/api-key" # resolved from Secrets Manager
DD_API_KEY: "sm://arn:aws:secretsmanager:us-east-1:123456789:secret:datadog-key"

The agent resolves sm:// references from AWS Secrets Manager at dispatch time and injects the values securely via Kubernetes Secrets. See Repo Configuration for full details.