
Step 1: Clone the starter project
Step 2: Create your Doppler project
Step 3: Add your secrets to Doppler
Step 4: Cloudflare local development with Doppler
Step 5: Deploy the application and sync secrets to Cloudflare
Step 6: Set up GitHub Actions for CI/CD
Step 7: Rotating secrets
Step 8: Team collaboration
Troubleshooting common issues
What you've accomplished
In this tutorial, you'll set up a complete secrets management workflow for Cloudflare Workers using Doppler. By the end, you'll have:
Managing secrets across development, staging, and production environments is one of the most common sources of friction in serverless development. When you're working alone, a .dev.vars file and a few wrangler secret put commands might suffice. But as your team grows and your deployment frequency increases, you start running into real problems. Secrets get out of sync. Someone on the team doesn't have the latest API key. Rotating a compromised credential requires updating three different places. And there's no audit trail showing who changed what or when.
Using a centralized secrets manager is a straightforward way to address this issue. Instead of scattering secrets across .env files, CI/CD variables, and Cloudflare's dashboard, you maintain a single source of truth. Everyone on the team pulls from the same place. Rotating a secret becomes a one-step operation. And you get a complete history of every change.
Before starting, make sure you have:
Trusted by the world’s best DevOps and security teams. Doppler is the secrets manager developers love.
