dokploy

Use for Dokploy-specific API operations (apps, deployments, databases, domains, backups, settings) when tasks explicitly involve Dokploy. Route requests to domain modules, enforce inspect-first troubleshooting and controlled mutations via x-api-key authentication, and avoid use for generic Docker/Kubernetes work outside Dokploy.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "dokploy" with this command: npx skills add achals-iglu/dokploy-api

Dokploy API Skill

Use this skill to operate Dokploy through its API schema and generated domain modules.

Scope guardrails

  • Use this skill only when the task is explicitly about Dokploy.
  • Do not use this skill for generic Docker/Kubernetes guidance unless Dokploy endpoints are involved.
  • Authenticate with x-api-key header.
  • Prefer minimal, reversible changes.

Routing (module-first)

Start at modules/_index.md, then load only the smallest matching module.

Common routes:

  • Applications/deployments: modules/application.md, modules/deployment.md, modules/rollback.md
  • Databases: modules/mysql.md, modules/postgres.md, modules/redis.md, modules/mongo.md, modules/mariadb.md
  • Networking/TLS: modules/domain.md, modules/redirects.md, modules/certificates.md, modules/port.md
  • Platform settings/security/backups: modules/settings.md, modules/security.md, modules/backup.md
  • Git providers: modules/github.md, modules/gitlab.md, modules/bitbucket.md, modules/gitea.md, modules/gitprovider.md

Standard execution flow (required)

  1. Classify intent and choose module by operation family.
  2. Resolve identifiers first using read/list/search endpoints.
  3. Preflight checks: required fields, scope, target existence, dependency impact.
  4. Mutate minimally with the smallest payload required.
  5. Verify outcome using read/status/search endpoints.
  6. Recover if needed using rollback/redeploy/restart operations where available.

Do not run destructive actions unless user intent is explicit.

Mutation safety policy

For create/update/delete/deploy/stop/restart actions, always enforce:

  • inspect before mutate
  • verify after mutate
  • report exact operation IDs used
  • include clear rollback/recovery next step on failure

If required fields are unknown, stop and fetch them from relevant read/list endpoints first.

Secret handling

  • Never echo raw API keys or tokens in user-visible output.
  • Redact secrets in logs and summaries.
  • Prefer environment/secure config storage over inline literals.

References

  • Domain index: modules/_index.md
  • API snapshot: openapi.json
  • Auth/profile source: Dokploy user profile token + x-api-key

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

Img2img

Generate images from text descriptions using DALL-E 3 while adhering to usage policies and avoiding realistic human faces.

Registry SourceRecently Updated
General

Habitat-GS-Navigator

Navigate and interact with photo-realistic 3DGS environments via the Habitat-GS Bridge. Use when: user asks to explore a 3D scene, perform embodied navigatio...

Registry SourceRecently Updated
General

Memory Palace

持久化记忆管理。Use when: 用户告诉你个人信息/偏好/习惯、需要记住项目状态/技术决策、完成任务后有可复用经验、用户说"记住""别忘了""下次注意"、需要回忆之前的对话内容。支持语义搜索和时间推理。

Registry SourceRecently Updated
General

Podcast Transcript Mining Authority Positioning

Extract guest appearances, speaking topics, and soundbites from podcast transcripts to build authority portfolios and generate podcast pitch templates. Use w...

Registry SourceRecently Updated