CLI Overview
Quick Start Guide
wheels info
wheels reload
wheels deps
wheels destroy
wheels watch
wheels generate app
wheels generate app-wizard
wheels generate controller
wheels generate model
wheels generate view
wheels generate property
wheels generate route
wheels generate resource
wheels generate api-resource
wheels generate frontend
wheels generate test
wheels generate snippets
wheels scaffold
wheels db create
wheels db drop
wheels db setup
wheels db reset
wheels db status
wheels db version
wheels db rollback
wheels db seed
wheels db dump
wheels db restore
wheels db shell
wheels db schema
wheels dbmigrate info
wheels dbmigrate latest
wheels dbmigrate up
wheels dbmigrate down
wheels dbmigrate reset
wheels dbmigrate exec
wheels dbmigrate create blank
wheels dbmigrate create table
wheels dbmigrate create column
wheels dbmigrate remove table
wheels test
wheels test run
wheels test coverage
wheels test debug
wheels config list
wheels config set
wheels config env
wheels env
wheels env setup
wheels env list
wheels env switch
wheels environment
wheels console
wheels runner
wheels server
wheels server start
wheels server stop
wheels server restart
wheels server status
wheels server log
wheels server open
wheels plugins
wheels plugins list
wheels plugins install
wheels plugins remove
wheels analyze
wheels analyze code
wheels analyze performance
wheels analyze security
wheels security
wheels security scan
wheels optimize
wheels optimize performance
wheels docs
wheels docs generate
wheels docs serve
wheels ci init
wheels docker init
wheels docker deploy
wheels deploy
wheels deploy audit
wheels deploy exec
wheels deploy hooks
wheels deploy init
wheels deploy lock
wheels deploy logs
wheels deploy proxy
wheels deploy push
wheels deploy rollback
wheels deploy secrets
wheels deploy setup
wheels deploy status
wheels deploy stop
Configuration Management
Creating Commands
Service Architecture
Migrations Guide
Testing Guide
Object Relational Mapping
Creating Records
Reading Records
Updating Records
Deleting Records
Column Statistics
Dynamic Finders
Getting Paginated Data
Associations
Nested Properties
Object Validation
Object Callbacks
Calculated Properties
Transactions
Dirty Records
Soft Delete
Automatic Time Stamps
Using Multiple Data Sources
wheels deploy secrets (Coming Soon)
This command may not work as expected. A complete and stable version is coming soon.
Manage deployment secrets and sensitive configuration.
Synopsis
wheels deploy secrets [action] [name] [value] [options]
Description
The wheels deploy secrets
command provides secure management of sensitive data like API keys, database passwords, and other credentials used during deployment. Secrets are encrypted and stored separately from your codebase.
Actions
| Action | Description |
|--------|-------------|
| list
| List all secrets for a target |
| set
| Set or update a secret |
| get
| Retrieve a secret value |
| delete
| Remove a secret |
| sync
| Synchronize secrets with target |
| rotate
| Rotate secret values |
| export
| Export secrets to file |
| import
| Import secrets from file |
Arguments
| Argument | Description | Required |
|----------|-------------|----------|
| action
| Action to perform | Yes |
| name
| Secret name | For set/get/delete |
| value
| Secret value | For set action |
Options
| Option | Description | Default |
|--------|-------------|---------|
| --target
| Deployment target | production
|
| --env-file
| Environment file for bulk operations | |
| --format
| Output format (table, json, dotenv) | table
|
| --force
| Skip confirmation prompts | false
|
| --encrypt
| Encryption method (aes256, rsa) | aes256
|
| --key-file
| Path to encryption key | .wheels-deploy-key
|
| --help
| Show help information | |
Examples
Set a secret
wheels deploy secrets set DB_PASSWORD mySecretPass123 --target=production
Set secret interactively (hidden input)
wheels deploy secrets set API_KEY --target=production
# Prompts for value without displaying it
List all secrets
wheels deploy secrets list --target=production
Get a specific secret
wheels deploy secrets get DB_PASSWORD --target=production
Delete a secret
wheels deploy secrets delete OLD_API_KEY --target=production
Import from .env file
wheels deploy secrets import --env-file=.env.production --target=production
Export secrets
wheels deploy secrets export --target=production --format=dotenv > .env.backup
Rotate database password
wheels deploy secrets rotate DB_PASSWORD --target=production
Secret Storage
Secrets are stored encrypted in:
- Local:
.wheels-deploy-secrets/[target].enc
- Remote: Deployment target's secure storage
Encryption
Secrets are encrypted using:
- AES-256 encryption by default
- Unique key per environment
- Optional RSA public key encryption
Key Management
Encryption keys stored in:
.wheels-deploy-key # Default key file
.wheels-deploy-key.pub # Public key (RSA)
.wheels-deploy-key.priv # Private key (RSA)
Secret Types
Environment Variables
Standard key-value pairs:
wheels deploy secrets set DATABASE_URL "mysql://user:pass@host/db"
wheels deploy secrets set REDIS_URL "redis://localhost:6379"
File-based Secrets
Store file contents as secrets:
wheels deploy secrets set SSL_CERT --file=/path/to/cert.pem
wheels deploy secrets set SSH_KEY --file=~/.ssh/id_rsa
Multi-line Secrets
wheels deploy secrets set PRIVATE_KEY --multiline
# Enter/paste content, end with Ctrl+D
Bulk Operations
Import from .env
# Import all variables from .env file
wheels deploy secrets import --env-file=.env.production
# Import with prefix
wheels deploy secrets import --env-file=.env --prefix=APP_
Export Formats
Table format:
wheels deploy secrets list
JSON format:
wheels deploy secrets list --format=json
DotEnv format:
wheels deploy secrets export --format=dotenv
Secret Rotation
Rotate secrets with automatic update:
# Rotate with auto-generated value
wheels deploy secrets rotate DB_PASSWORD
# Rotate with custom value
wheels deploy secrets rotate API_KEY --value=newKey123
# Rotate multiple secrets
wheels deploy secrets rotate DB_PASSWORD,REDIS_PASSWORD,API_KEY
Synchronization
Sync secrets to deployment target:
# Sync all secrets
wheels deploy secrets sync --target=production
# Verify sync status
wheels deploy secrets sync --target=production --dry-run
Access Control
Team Sharing
Share encrypted secrets with team:
# Export encrypted secrets
wheels deploy secrets export --target=production --encrypted > secrets.enc
# Import on another machine
wheels deploy secrets import --file=secrets.enc --key-file=team-key
Permission Levels
- Read: View secret names only
- Write: Set/update secrets
- Admin: Delete/rotate secrets
Integration
During Deployment
Secrets automatically injected:
{
"hooks": {
"pre-deploy": [
"wheels deploy secrets sync"
]
}
}
In Application
Access secrets via environment:
<cfset dbPassword = env("DB_PASSWORD", "")>
<cfset apiKey = env("API_KEY", "")>
Security Best Practices
- Never commit secrets to version control
- Use strong encryption keys
- Rotate secrets regularly
- Limit access to production secrets
- Audit secret usage via logs
- Use different secrets per environment
Backup and Recovery
Backup Secrets
# Encrypted backup
wheels deploy secrets export --target=production --encrypted > backup-$(date +%Y%m%d).enc
# Secure offsite backup
wheels deploy secrets export | gpg -c > secrets.gpg
Restore Secrets
# From encrypted backup
wheels deploy secrets import --file=backup-20240115.enc
# From GPG encrypted file
gpg -d secrets.gpg | wheels deploy secrets import
Troubleshooting
Common Issues
-
Encryption key not found:
wheels deploy secrets init --generate-key
-
Permission denied:
- Check file permissions on key files
- Verify user has deployment access
-
Secret not available during deployment:
- Ensure secrets are synced
- Check target configuration
Use Cases
- Database Credentials: Secure database passwords
- API Keys: Third-party service credentials
- SSL Certificates: Secure certificate storage
- OAuth Secrets: Client secrets for OAuth
- Encryption Keys: Application encryption keys
Notes
- Secrets are never logged or displayed in plain text
- Use environment-specific secrets
- Regular rotation improves security
- Keep encryption keys secure and backed up
- Monitor secret access in production
See Also
- wheels deploy init - Initialize deployment
- wheels deploy exec - Execute deployment
- wheels config set - Set configuration values
- Security Best Practices
- Synopsis
- Actions
- Arguments
- Options
- Examples
- Set a secret
- Set secret interactively (hidden input)
- List all secrets
- Get a specific secret
- Delete a secret
- Import from .env file
- Export secrets
- Rotate database password
- Secret Storage
- Encryption
- Key Management
- Secret Types
- Environment Variables
- File-based Secrets
- Multi-line Secrets
- Bulk Operations
- Import from .env
- Export Formats
- Secret Rotation
- Synchronization
- Access Control
- Team Sharing
- Permission Levels
- Integration
- During Deployment
- In Application
- Security Best Practices
- Backup and Recovery
- Backup Secrets
- Restore Secrets
- Troubleshooting
- Common Issues
- Use Cases
- Notes
- See Also