967 B
967 B
Dokploy Project-Level Secrets (deployment-credentials)
Purpose: document how to add and manage Dokploy project-level secrets that Dokploy will use to access repositories or external resources.
- In Dokploy, open the project settings for this repository/project.
- Navigate to "Secrets" or "Project-level secrets".
- Add a secret named
REPO_DEPLOY_KEYcontaining a deploy key or token the Dokploy runner can use to clone the Gitea repository (recommended: SSH key or personal access token with repo read access). - Add any other required secrets (e.g., registry credentials) and mark them as masked.
- In project configuration, reference the secret names so Dokploy injects them into the deploy environment.
Security notes:
- Use least-privilege tokens (read-only where possible).
- Rotate keys periodically and document rotation steps in the runbook.
- Do not commit secrets into repository files; store them only in Dokploy secrets or an external vault.