ss-cli-deploy
SKILL.md
Deploy — Docker Compose with Secrets Injected
Pulls Docker images and starts a Compose service with Secret Server credentials injected as environment variables. Secrets flow directly into the subprocess — never written to disk.
When to use
- Deploying a service that reads credentials from environment variables
- Starting a service without creating plaintext
.envfiles - CI/CD workflows where secrets must not touch the filesystem
Prerequisites
- Valid Secret Server token
- A JSON map file defining which secrets map to which env vars
- Docker Compose installed on the target machine
Running a deploy
# Deploy in the current directory
ss-cli run --map-file env-map.json -- docker-compose up -d
# Deploy in a specific directory
ss-cli run --map-file env-map.json -- bash -c "cd /opt/myservice && docker-compose pull && docker-compose up -d"
# Inject a single secret (all fields become env vars with optional prefix)
ss-cli run --secret 21909 --env-prefix DB_ -- docker-compose up -d
# Injects: DB_USERNAME, DB_PASSWORD, DB_URL, etc.
Script
./skills/deploy/scripts/deploy.sh \
--map-file ./env-map.json \
--dir /opt/myservice
How it works
- Token is validated before any work starts
- Secrets are fetched and held in memory
docker-compose pull && docker-compose up -druns as a child process with the secrets in its environment- When the process exits, secrets are gone
Security note
Prefer ss-cli run over writing a .env file whenever possible. The secrets never touch the filesystem and cannot be accidentally committed to version control or left behind after a deploy.
Weekly Installs
2
Repository
sieteunoseis/ss-cliFirst Seen
Mar 19, 2026
Security Audits
Installed on
amp2
cline2
opencode2
cursor2
kimi-cli2
warp2