3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
8.1 Project Secrets
Orbnetes deployment and release orchestration documentation for operators and platform teams.
This section explains how runtime configuration is managed and injected into pipelines in Orbnetes.
Goal of the model:
- keep blueprints reusable,
- keep sensitive data out of YAML,
- apply correct values per project and per environment,
- provide predictable override behavior.
Project Secrets are sensitive key/value entries scoped to one project.
Use Project Secrets for:
- API tokens,
- deploy credentials,
- private registry auth,
- service-specific secrets used across multiple runs/releases in the same project.
Characteristics:
- Visible and usable only in project context (subject to permissions).
- Not intended for cross-project sharing by default.
- Should be referenced in blueprint via
${{ secrets.KEY }}.
When to choose Project Secret:
- Secret is shared across environments in a project.
- Secret should never be visible to other projects.
- Secret changes are managed by project owners/operators.