RackPeek can automatically save and sync its configuration with any Git host
that accepts a personal access token over HTTPS — GitHub, Gitea, GitLab,
Bitbucket, Forgejo, self-hosted, etc. RackPeek does not use any host-specific
APIs; the integration is plain git over HTTPS.
write:repository.write_repository.Repositories: Read, Write.Copy the token immediately — most hosts only show it once.
Provide the token and username to the container via environment variables:
| Variable | Required | Description |
|---|---|---|
GIT_TOKEN |
Yes | Personal access token (used as the password for HTTP Basic auth). |
GIT_USERNAME |
Yes | The username the token belongs to. |
GIT_INSECURE_TLS |
No | Set to true to skip TLS certificate validation — useful when pointing at a self-hosted Gitea / GitLab behind a private CA or self-signed certificate. Leave unset for any public host. |
Example with Docker Compose, pointing at a self-hosted Gitea:
version: "3.9"
services:
rackpeek:
image: aptacode/rackpeek:latest
container_name: rackpeek
ports:
- "8080:8080"
volumes:
- rackpeek-config:/app/config
environment:
- GIT_TOKEN=your_token_here
- GIT_USERNAME=your_username
# Uncomment the next line only if your Git host uses a private CA
# or a self-signed certificate (common for home-lab Gitea instances):
# - GIT_INSECURE_TLS=true
restart: unless-stopped
volumes:
rackpeek-config:
Example with the Docker CLI:
docker run -d \
--name rackpeek \
-p 8080:8080 \
-v rackpeek-config:/app/config \
-e GIT_TOKEN=your_token_here \
-e GIT_USERNAME=your_username \
aptacode/rackpeek:latest
Open RackPeek in the browser. With GIT_TOKEN set, a Git status indicator
appears in the header. Enable Git when prompted, then enter the repository
remote URL — for example:
https://github.com/youruser/rackpeek-config.githttps://gitea.example.com/youruser/rackpeek-config.githttps://gitlab.example.com/youruser/rackpeek-config.gitRackPeek will commit and sync configuration changes from there on.
GIT_INSECURE_TLS=true disables certificate validation on push, pull,
and fetch. Only set it on networks you trust. Public hosts (github.com,
gitlab.com, gitea.com, …) ship correct, trusted certificates — you do
not need this flag for them.