public MapField<string, ByteString> SecretEnv { get; }
Map of environment variable name to its encrypted value.
Secret environment variables must be unique across all of a build's
secrets, and must be used by at least one build step. Values can be at most
64 KB in size. There can be at most 100 secret values across all of a
build's secrets.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-19 UTC."],[[["\u003cp\u003eThe latest version of the \u003ccode\u003eSecret\u003c/code\u003e class within the Cloud Build v1 API is 2.15.0, with prior versions from 2.14.0 down to 1.0.0 also being available.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eSecret\u003c/code\u003e class is a .NET class that deals with managing encrypted secrets within the Google Cloud Build environment, and it can be used in the Google.Cloud.CloudBuild.V1 namespace.\u003c/p\u003e\n"],["\u003cp\u003eThis \u003ccode\u003eSecret\u003c/code\u003e class allows for the association of encrypted environment variables with a Cloud KMS key for decryption.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eSecret\u003c/code\u003e class, derived from the \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e interfaces, has properties \u003ccode\u003eKmsKeyName\u003c/code\u003e for the key used in decryption, and \u003ccode\u003eSecretEnv\u003c/code\u003e to store the encrypted environment variables.\u003c/p\u003e\n"],["\u003cp\u003eThe preferred method is using \u003ccode\u003ekmsKeyName\u003c/code\u003e with \u003ccode\u003eavailable_secrets\u003c/code\u003e rather than \u003ccode\u003ekmsKeyName\u003c/code\u003e with \u003ccode\u003esecret\u003c/code\u003e to encrypt and decrypt the credentials.\u003c/p\u003e\n"]]],[],null,[]]