Obfuscate sensitive data in source control, expose it again for circle and then deploy
schadenfred
MIT