This repository is the management hub for a multi-repo project under the cloud-neutral-toolkit org.
- Open the workspace:
console.svc.plus.code-workspace - Read architecture and ownership:
docs/architecture/project-overview.md - Follow unified rules:
AGENTS.mdanddocs/operations-governance/governance.md - Run release flow from checklist:
docs/operations-governance/release-checklist.md - Track cross-repo work:
docs/operations-governance/cross-repo-tasks.md
- Project overview:
docs/architecture/project-overview.md - Agent operating rules:
AGENTS.md - Governance standard:
docs/operations-governance/governance.md - Release checklist:
docs/operations-governance/release-checklist.md - Cross-repo task board:
docs/operations-governance/cross-repo-tasks.md - Docs index:
docs/README.md - Workspace file:
console.svc.plus.code-workspace - Env template:
.env.example - Env/secret skill:
skills/env-secrets-governance/SKILL.md - Root README skill:
skills/readme-root-standard/SKILL.md - Unified setup.sh skill:
skills/unified-setup-sh/SKILL.md
For cross-repo requests, use one objective per task and require this output format:
- Change Scope
- Files Changed
- Risk Points
- Test Commands
- Rollback Plan
- Current owner model: all listed repositories are owned/managed by
@shenlan. - Org dashboard: cloud-neutral-toolkit dashboard
- Secrets stay in local
.env(gitignored) and production secret managers. - This repo holds standards and coordination docs, not service runtime code.
This repo includes .github/workflows/stackflow.yaml which plans/validates StackFlow configs stored in the cloud-neutral-toolkit/gitops repo (e.g. gitops/StackFlow/svc-plus.yaml).
Secrets (by phase):
- Plan/Validate (today):
GITOPS_CHECKOUT_TOKEN(optional): needed only ifcloud-neutral-toolkit/gitopsis private or defaultGITHUB_TOKENcannot read it.
- Future phases (not enabled in this workflow yet):
CLOUDFLARE_API_TOKEN: dns-apply (cloudflare).ALIYUN_AK,ALIYUN_SK: dns-apply (alicloud).GCP_*: iac/deploy; prefer Workload Identity Federation (OIDC) and avoid long-lived JSON keys.VERCEL_TOKEN: optional vercel-side validation/config via API.
Use a fine-grained PAT with least privilege, scoped to only the cloud-neutral-toolkit/gitops repository.
Steps:
- GitHub:
Settings->Developer settings->Personal access tokens->Fine-grained tokens - Click
Generate new token Resource owner: selectcloud-neutral-toolkitRepository access: selectOnly select repositories, then choose onlycloud-neutral-toolkit/gitopsPermissions:Repository permissions->Contents: Read- Keep everything else as
No access
- Generate token and copy it
- In
cloud-neutral-toolkit/github-org-cloud-neutral-toolkit:Settings->Secrets and variables->Actions->New repository secret- Name:
GITOPS_CHECKOUT_TOKEN - Value: the token
- Verify:
- Run GitHub Actions workflow
StackFlow (GitOps Plan/Validate) - If you no longer see
repository not found/permission denied, the token is working
- Run GitHub Actions workflow
For long-term governance, use a GitHub App installed on the org with:
- Repository: only
cloud-neutral-toolkit/gitops - Permission:
Contents: Read
Then update the workflow to use the App installation token for checkout.