mirror of
https://github.com/hoppscotch/hoppscotch.git
synced 2026-04-25 16:55:59 +03:00
[GH-ISSUE #5580] [bug]: Environment secrets are not syncing between Browser and Desktop clients #2155
Labels
No labels
CodeDay
a11y
browser limited
bug
bug fix
cli
core
critical
design
desktop
discussion
docker
documentation
duplicate
enterprise
feature
feature
fosshack
future
good first issue
hacktoberfest
help wanted
i18n
invalid
major
minor
need information
need testing
not applicable to hoppscotch
not reproducible
pull-request
question
refactor
resolved
sandbox
self-host
spam
stale
testmu
wip
wont fix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hoppscotch#2155
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @roopepaajanen on GitHub (Nov 13, 2025).
Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/5580
Is there an existing issue for this?
Platform
Web App
Browser
Chrome
Operating System
macOS
Bug Description
Environment secrets created or modified in the Browser client do not appear in the Desktop client — and vice versa. This results in API requests failing due to missing secret values.
Steps to Reproduce
Expected Behaviour
Environment secrets (names and values) should sync consistently across Browser and Desktop clients.
Actual Behaviour
Secret keys sync, but secret values do not, causing secrets to disappear depending on where the last edit was made
Configurations:
Deployment Type
Self-hosted (on-prem deployment)
Version
2025.10.1
@roopepaajanen commented on GitHub (Nov 13, 2025):
The UI on the other platform after changing the value:
@liyasthomas commented on GitHub (Nov 13, 2025):
This is an expected behavior because secrets are never stored on Hoppscotch servers. It’s expected that users will populate the value of the secret variable at runtime. While we’re enhancing the user experience of this feature, we welcome feedback. For more information, refer to the documentation on Types of Variables in an Environment.
@roopepaajanen commented on GitHub (Nov 13, 2025):
Thanks for the quick response and for clarifying the functionality, @liyasthomas!
I understand the limitation around storing secrets in the Hoppscotch cloud. However, for self-hosted customers using an external database, secrets are fully under our control. In that setup, many of us would benefit from (or at least appreciate the option for) seamless use of both the Browser and Desktop clients — for example, by allowing secrets to be stored in the external database.
This ticket can be closed. Thanks again for the fast response!