Skip to main content

Synchronized Release and Healing tools for CoReason

Project description

CoReason Coordinated Release Guide

This document describes the standardized, multi-repository release process for the CoReason suite of packages. It applies to all developers and AI agents working within this workspace.


1. Release Architecture & Dependency DAG

Because of Python package dependencies and lockfile requirements, releases must propagate down the directed acyclic graph (DAG) below:

graph TD
    M["1. coreason-manifest (Ontology Root)"] --> UA["2. coreason-urn-authority"]
    M --> E["3a. coreason-ecosystem"]
    M --> R["3b. coreason-runtime"]
    M --> ME["3c. coreason-meta-engineering"]
    
    UA --> R
    UA --> ME
    
    R --> D["4. coreason-documentation"]
    E --> D
    
    R --> I["5. coreason-release-healer (GitOps)"]
    SA["3d. coreason-sensory-app"] --> I
    
    SC["UI Primitives: coreason-sensory-core"] --> SA

Topological Cascade Rules:

  1. Upstream First: A change to coreason-manifest must be merged, tagged, and published first.
  2. Propagate Dependency Pins: Downstream repositories must have their version pins updated (in pyproject.toml or package.json), their lockfiles compiled, and committed before they can be released.

2. Versioning & Hook Validations

Version Schemes:

  • VCS-Dynamic (Hatch/Python): All Python packages (coreason-manifest, coreason-urn-authority, coreason-runtime, coreason-ecosystem, coreason-meta-engineering, coreason-documentation, coreason-release-healer, coreason-isv-admin) resolve their versions dynamically from Git tags using hatch-vcs. They retrieve version at runtime using importlib.metadata with fallback "0.0.0-dev".
  • VCS-Dynamic (NPM/Node): NPM packages (coreason-sensory-app, coreason-sensory-core, and coreason-sensory-embed) specify version "0.0.0-dev" in package.json in Git. The release/publishing workflows dynamically inject the tag version (e.g. vX.Y.Z) at build/publish time.

Git Verification Hooks:

To prevent CI publish failures, standard git hooks run automatically on:

  1. Pre-commit: Ensures static files conform to expected version declarations.
  2. Pre-push: Rejects tag pushes if the tag vX.Y.Z does not match the SemVer format. For any static package files (if any are left static), it ensures tag version matches package version.

3. Coordinated Release Pipeline

The release process integrates local verification with cloud-based continuous delivery:

[Developer updates coreason-manifest]
             |
             v
1. [Local Helper CLI] --------> Updates dependency version pins, compiles lockfiles,
                                and bumps static package files topologically.
             |
             v
2. [Release Please (Cloud)] --> Evaluates Conventional Commits, maintains CHANGELOG.md,
                                drafts "Release PRs", and creates Git tags on PR merge.
             |
             v
3. [Publish Workflow (CI)] ---> Builds PyPI/NPM packages and Docker containers.
             |
             v
4. [GitOps Promotion (CD)] ---> Triggers a Repository Dispatch payload to Argo CD configurations
                                in `coreason-release-healer` to roll out new container tags.

4. OCI Artifacts, Cloud Marketplaces, and GitOps

To support automated, secure deployments across cloud substrates and developer sandboxes, the release pipeline publishes and verifies the following target artifacts:

A. OCI Container Images

  • GitHub Container Registry (GHCR): All components are packaged as Docker-compatible OCI images under ghcr.io/coreason-ai/.
  • Cosign Cryptographic Signing: Every container image is signed via keyless Sigstore/Cosign to guarantee supply chain integrity.
  • SLSA Level 3 Provenance: GitHub Actions generates SLSA build provenance and publishes it via GitHub Attestations.
  • Dynamic Tagging: Images are published with both the explicit tag (vX.Y.Z) and the :latest tag to support automatic updates in tracking environments.

B. OCI Helm Charts

  • Infrastructure Packaging: Helm charts (e.g., coreason-enterprise and coreason-mesh) are packaged and pushed as OCI artifacts to ghcr.io/coreason-ai/charts/.
  • Signature Verification: Production Kubernetes clusters must verify Helm chart signatures before deployment:
    cosign verify ghcr.io/coreason-ai/charts/coreason-enterprise:vX.Y.Z
    

C. Cloud Marketplace AMIs & Terraform

  • Topology-in-a-Box: All dependencies are bundled into an orchestrated, self-bootstrapping enclave for push-button deployment on AWS ECS/Fargate or Azure Container Instances.
  • Packer Pipelines: Pre-baked AMIs containing the systemd coreason.service are built via Packer (infrastructure/packer/aws/topology-in-a-box.pkr.hcl) to pull the latest signed containers on boot.
  • Terraform IaC: Infrastructure templates are stored in coreason-ecosystem/infrastructure/terraform/aws/ to automate provisioning VPCs, IAM task roles, and clusters.

D. GitOps Promotion (ArgoCD)

  • Repository Dispatch: Once new images are published to GHCR, the workflow sends a dispatch payload to coreason-release-healer.
  • ArgoCD Reconciliation: ArgoCD automatically updates the targeting manifests to sync the new release tags and roll out updates using sync wave orchestration.

E. Swarm-in-a-Box / Enclave Packaging

  • Local Dev/Test E2E Swarm: The full Tripartite Swarm (Gateway, Runtime/WASM Sandbox, URN Authority, Asset Forge) is orchestrated locally via docker-compose.e2e.yaml under coreason-ecosystem/tests/e2e_swarm/ in accordance with the anti-mocking, real-test mandate.
  • Enterprise Single-Enclave ("Swarm-in-a-Box"): Standalone, single-host virtual machine image or container set that boots all Tripartite planes in isolation.
  • Deprecation of Federated Swarm-in-a-Box: The decentralized/federated multi-host data models (previously detailed in Challenge X23) are officially deprecated under the Absolute Type Isomorphism invariant. All downstream enclaves must remain purely anemic and tightly isomorphic to the Python data plane (coreason_manifest.spec.ontology) to preserve zero-trust verification boundaries. Only single-enclave Swarm-in-a-Box configurations are supported.

5. Release Orchestration Commands

Use the central workspace release manager to run coordinated tasks:

  • View global status and check mismatches:

    python scripts/release_helper.py --status
    
  • Bump package versions locally:

    python scripts/release_helper.py --bump [major|minor|patch] --repo <repo-name>
    
  • Tag a local repository version (checks version matches first):

    python scripts/release_helper.py --tag <version> --repo <repo-name>
    

    [!IMPORTANT] Release Please (Release Me) Only: coreason-release-healer uses Release Please exclusively for release orchestration. Direct local tag creation via the helper CLI and direct tag pushes to origin are blocked. Releases for this repository must be triggered by merging a Release Please PR.


6. Agent Boundary Constraints

AI agents operating in this workspace must strictly adhere to the following safety rules:

  1. No Direct Registry Publishes: Do not run commands that upload packages or images directly to registries (e.g. npm publish, cargo publish, docker push, pypi publish). All publishes must go through GitHub Actions triggered by tag merges.
  2. No Direct Workflow Modifications: Do not modify .github/workflows/ scripts unless specifically directed and approved.
  3. Strict Commit Conventions: Use conventional commit formats (feat(...), fix(...), chore(...)) for all code modifications.
  4. Enforce Release Please for Infrastructure: Do not attempt to bypass release-please for coreason-release-healer. Any release tag must be generated via a merged Release Please pull request.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

coreason_release_healer-0.19.0.tar.gz (42.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

coreason_release_healer-0.19.0-py3-none-any.whl (32.6 kB view details)

Uploaded Python 3

File details

Details for the file coreason_release_healer-0.19.0.tar.gz.

File metadata

  • Download URL: coreason_release_healer-0.19.0.tar.gz
  • Upload date:
  • Size: 42.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for coreason_release_healer-0.19.0.tar.gz
Algorithm Hash digest
SHA256 2f4115dd8ac237a020ff3eb5d4dcc283e3efb5822b79114bb9809257eb04c5dd
MD5 3907a5fe3e1c717bd90855cd750b01cf
BLAKE2b-256 97ff8b8e2006c81d383fafb490053683b419673ce2b20dd02063cf7a46c435bc

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_release_healer-0.19.0.tar.gz:

Publisher: publish.yml on CoReason-AI/coreason-release-healer

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file coreason_release_healer-0.19.0-py3-none-any.whl.

File metadata

File hashes

Hashes for coreason_release_healer-0.19.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7903721a78ec0c51174ae46f1719a0287773d9fc4b3459342d61fcb40e0cfb30
MD5 4f2b7cef9e13a5694fc6a2e85f0b1896
BLAKE2b-256 37d0b5d62341faec29058a41d071eb6e0726c1a8e1422e7d488bbe47049fa94e

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_release_healer-0.19.0-py3-none-any.whl:

Publisher: publish.yml on CoReason-AI/coreason-release-healer

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page