Skip to main content

Synchronized Release and Healing tools for CoReason

Project description

CoReason Coordinated Release Guide

This document describes the standardized, multi-repository release process for the CoReason suite of packages. It applies to all developers and AI agents working within this workspace.


1. Release Architecture & Dependency DAG

Because of Python package dependencies and lockfile requirements, releases must propagate down the directed acyclic graph (DAG) below:

graph TD
    M["1. coreason-manifest (Ontology Root)"] --> UA["2. coreason-urn-authority"]
    M --> E["3a. coreason-ecosystem"]
    M --> R["3b. coreason-runtime"]
    M --> ME["3c. coreason-meta-engineering"]
    
    UA --> R
    UA --> ME
    
    R --> D["4. coreason-documentation"]
    E --> D
    
    R --> I["5. coreason-infrastructure (GitOps)"]
    SA["3d. coreason-sensory-app"] --> I
    
    SC["UI Primitives: coreason-sensory-core"] --> SA
    
    I --> INST["6. coreason-installer (Enclave Installer)"]

Topological Cascade Rules:

  1. Upstream First: A change to coreason-manifest must be merged, tagged, and published first.
  2. Propagate Dependency Pins: Downstream repositories must have their version pins updated (in pyproject.toml or package.json), their lockfiles compiled, and committed before they can be released.

2. Versioning & Hook Validations

Version Schemes:

  • VCS-Dynamic (Hatch/Python): All Python packages (coreason-manifest, coreason-urn-authority, coreason-runtime, coreason-ecosystem, coreason-meta-engineering, coreason-documentation, coreason-infrastructure, coreason-isv-admin, coreason-installer) resolve their versions dynamically from Git tags using hatch-vcs. They retrieve version at runtime using importlib.metadata with fallback "0.0.0-dev".
  • VCS-Dynamic (NPM/Node): NPM packages (coreason-sensory-app, coreason-sensory-core, and coreason-sensory-embed) specify version "0.0.0-dev" in package.json in Git. The release/publishing workflows dynamically inject the tag version (e.g. vX.Y.Z) at build/publish time.

Git Verification Hooks:

To prevent CI publish failures, standard git hooks run automatically on:

  1. Pre-commit: Ensures static files conform to expected version declarations.
  2. Pre-push: Rejects tag pushes if the tag vX.Y.Z does not match the SemVer format. For any static package files (if any are left static), it ensures tag version matches package version.

3. Coordinated Release Pipeline

The release process integrates local verification with cloud-based continuous delivery:

[Developer updates coreason-manifest]
             |
             v
1. [Local Helper CLI] --------> Updates dependency version pins, compiles lockfiles,
                                and bumps static package files topologically.
             |
             v
2. [Release Please (Cloud)] --> Evaluates Conventional Commits, maintains CHANGELOG.md,
                                drafts "Release PRs", and creates Git tags on PR merge.
             |
             v
3. [Publish Workflow (CI)] ---> Builds PyPI/NPM packages and Docker containers.
             |
             v
4. [GitOps Promotion (CD)] ---> Triggers a Repository Dispatch payload to Argo CD configurations
                                in `coreason-infrastructure` to roll out new container tags.

4. OCI Artifacts, Cloud Marketplaces, and GitOps

To support automated, secure deployments across cloud substrates and developer sandboxes, the release pipeline publishes and verifies the following target artifacts:

A. OCI Container Images

  • GitHub Container Registry (GHCR): All components are packaged as Docker-compatible OCI images under ghcr.io/coreason-ai/.
  • Cosign Cryptographic Signing: Every container image is signed via keyless Sigstore/Cosign to guarantee supply chain integrity.
  • SLSA Level 3 Provenance: GitHub Actions generates SLSA build provenance and publishes it via GitHub Attestations.
  • Dynamic Tagging: Images are published with both the explicit tag (vX.Y.Z) and the :latest tag to support automatic updates in tracking environments.

B. OCI Helm Charts

  • Infrastructure Packaging: Helm charts (e.g., coreason-enterprise and coreason-mesh) are packaged and pushed as OCI artifacts to ghcr.io/coreason-ai/charts/.
  • Signature Verification: Production Kubernetes clusters must verify Helm chart signatures before deployment:
    cosign verify ghcr.io/coreason-ai/charts/coreason-enterprise:vX.Y.Z
    

C. Cloud Marketplace AMIs & Terraform

  • Topology-in-a-Box: All dependencies are bundled into an orchestrated, self-bootstrapping enclave for push-button deployment on AWS ECS/Fargate or Azure Container Instances.
  • Packer Pipelines: Pre-baked AMIs containing the systemd coreason.service are built via Packer (infrastructure/packer/aws/topology-in-a-box.pkr.hcl) to pull the latest signed containers on boot.
  • Terraform IaC: Infrastructure templates are stored in coreason-ecosystem/infrastructure/terraform/aws/ to automate provisioning VPCs, IAM task roles, and clusters.

D. GitOps Promotion (ArgoCD)

  • Repository Dispatch: Once new images are published to GHCR, the workflow sends a dispatch payload to coreason-infrastructure.
  • ArgoCD Reconciliation: ArgoCD automatically updates the targeting manifests to sync the new release tags and roll out updates using sync wave orchestration.

E. Swarm-in-a-Box / Enclave Packaging

  • Local Dev/Test E2E Swarm: The full Tripartite Swarm (Gateway, Runtime/WASM Sandbox, URN Authority, Asset Forge) is orchestrated locally via docker-compose.e2e.yaml under coreason-ecosystem/tests/e2e_swarm/ in accordance with the anti-mocking, real-test mandate.
  • Enterprise Single-Enclave ("Swarm-in-a-Box"): Standalone, single-host virtual machine image or container set that boots all Tripartite planes in isolation.
  • Deprecation of Federated Swarm-in-a-Box: The decentralized/federated multi-host data models (previously detailed in Challenge X23) are officially deprecated under the Absolute Type Isomorphism invariant. All downstream enclaves must remain purely anemic and tightly isomorphic to the Python data plane (coreason_manifest.spec.ontology) to preserve zero-trust verification boundaries. Only single-enclave Swarm-in-a-Box configurations are supported.

5. Release Orchestration Commands

Use the central workspace release manager to run coordinated tasks:

  • View global status and check mismatches:

    python scripts/release_helper.py --status
    
  • Bump package versions locally:

    python scripts/release_helper.py --bump [major|minor|patch] --repo <repo-name>
    
  • Tag a local repository version (checks version matches first):

    python scripts/release_helper.py --tag <version> --repo <repo-name>
    

    [!IMPORTANT] Release Please (Release Me) Only: coreason-infrastructure uses Release Please exclusively for release orchestration. Direct local tag creation via the helper CLI and direct tag pushes to origin are blocked. Releases for this repository must be triggered by merging a Release Please PR.


6. Agent Boundary Constraints

AI agents operating in this workspace must strictly adhere to the following safety rules:

  1. No Direct Registry Publishes: Do not run commands that upload packages or images directly to registries (e.g. npm publish, cargo publish, docker push, pypi publish). All publishes must go through GitHub Actions triggered by tag merges.
  2. No Direct Workflow Modifications: Do not modify .github/workflows/ scripts unless specifically directed and approved.
  3. Strict Commit Conventions: Use conventional commit formats (feat(...), fix(...), chore(...)) for all code modifications.
  4. Enforce Release Please for Infrastructure: Do not attempt to bypass release-please for coreason-infrastructure. Any release tag must be generated via a merged Release Please pull request.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

coreason_release_healer-0.20.1.tar.gz (55.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

coreason_release_healer-0.20.1-py3-none-any.whl (44.1 kB view details)

Uploaded Python 3

File details

Details for the file coreason_release_healer-0.20.1.tar.gz.

File metadata

  • Download URL: coreason_release_healer-0.20.1.tar.gz
  • Upload date:
  • Size: 55.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for coreason_release_healer-0.20.1.tar.gz
Algorithm Hash digest
SHA256 fa5359c16c64c03723bb060d0a18ac44c7280b774af4a283429e823b267c67e2
MD5 53259cf184495296c95dc027ca913628
BLAKE2b-256 53f495f5a281ea9ee34bdd754f4c8cd305fd86c284352652693b819b50b5bde0

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_release_healer-0.20.1.tar.gz:

Publisher: publish.yml on CoReason-AI/coreason-release-healer

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file coreason_release_healer-0.20.1-py3-none-any.whl.

File metadata

File hashes

Hashes for coreason_release_healer-0.20.1-py3-none-any.whl
Algorithm Hash digest
SHA256 c37f8265e0c91b4082da429000cf07ebeb5ebb5ff2a7ca15379045d1821a5798
MD5 aa92ed157391a7e73bda09942a287faa
BLAKE2b-256 72a8fce151def56aaffe5ec8b8c6dda754fa912e8e3e379b246fb127b58df871

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_release_healer-0.20.1-py3-none-any.whl:

Publisher: publish.yml on CoReason-AI/coreason-release-healer

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page