LinuxCommandLibrary

doppler-run

execute commands with injected secrets

TLDR

Run command with injected secrets

$ doppler run -- [node app.js]
copy
Run with specific config
$ doppler run --config [dev] -- [command]
copy
Run with specific project
$ doppler run --project [myapp] -- [command]
copy
Passthrough to shell
$ doppler run -- sh -c "[echo \$SECRET_KEY]"
copy
Run with fallback file
$ doppler run --fallback [.env.backup] -- [command]
copy

SYNOPSIS

doppler run [options] -- command [args]

DESCRIPTION

doppler run executes a command with secrets from Doppler injected as environment variables. This enables applications to access secrets without code changes or local configuration files.
Secrets are fetched from the Doppler API and made available only to the executed process. The double-dash separates doppler options from the command to run.
Fallback files provide resilience when Doppler is unreachable, while preserve-env prevents overwriting existing environment variables.

PARAMETERS

-- COMMAND

Command to run with injected secrets.
--config NAME
Configuration environment to use.
--project NAME
Project name.
--fallback FILE
Fallback file if Doppler unavailable.
--no-fallback
Disable fallback behavior.
--preserve-env
Preserve existing environment variables.
--help
Display help information.

CAVEATS

Requires authenticated doppler CLI. Network latency affects startup time. Secrets visible in process environment. Child processes inherit secrets.

HISTORY

doppler run is the primary command for secrets injection in the Doppler CLI, implementing the zero-configuration secrets access that Doppler was designed to provide.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community