macp-runtime v0.4.0

Reference implementation of the MACP runtime in Rust

Reference runtime for the Multi-Agent Coordination Protocol (MACP).

This runtime implements the current MACP core/service surface, five standards-track modes, and one built-in extension mode. The focus of this release is freeze-readiness for SDKs and real-world unary and streaming integrations: strict SessionStart, mode-semantic correctness, authenticated senders, bounded resources, durable restart recovery, and extension mode lifecycle management.

What changed in v0.4.0

  • Strict canonical SessionStart for standard modes
    • no empty payloads
    • no implicit default mode
    • explicit mode_version, configuration_version, and positive ttl_ms
    • explicit unique participants for standards-track modes
  • Decision Mode authority clarified
    • initiator/coordinator may emit Proposal and Commitment
    • participants emit Evaluation, Objection, and Vote
    • duplicate proposal_id values are rejected
    • votes are tracked per proposal, per sender
  • Proposal Mode commitment gating fixed
    • Commitment is accepted only after acceptance convergence or a terminal rejection
  • Security boundary added
    • TLS-capable startup
    • authenticated sender derivation via bearer token or dev header mode
    • per-request authorization
    • payload size limits
    • rate limiting
  • Durable local persistence
    • per-session append-only log files and session snapshots via FileBackend
    • crash recovery with dedup state reconciliation
    • atomic writes (tmp file + rename) prevent partial-write corruption
  • Authoritative accepted history
    • log append failures are now fatal — messages are not acknowledged without a durable record
    • session state is rebuilt from append-only logs on startup via replay (no snapshot dependency)
    • LogEntry enriched with session_id, mode, macp_version for self-describing replay
  • Session ID security policy
    • session IDs must be UUID v4/v7 (hyphenated lowercase) or base64url tokens (22+ chars)
    • weak/human-readable IDs are rejected with INVALID_SESSION_ID
  • Signal enforcement
    • Signals are strictly ambient — non-empty session_id or mode is rejected
  • StreamSession enabled
    • Initialize advertises stream: true
    • StreamSession provides per-session bidirectional streaming of accepted envelopes
    • Passive subscribe (RFC-MACP-0006-A1): a subscribe_session_id + after_sequence frame replays accepted history and then delivers live envelopes; allowed for declared participants, the initiator, or observer identities
    • WatchModeRegistry fires live RegistryChanged events on mode register/unregister/promote
    • WatchRoots implemented (basic: send initial state, hold stream open)
  • Extension mode lifecycle
    • multi_round demoted from standards-track to built-in extension (ext.multi_round.v1)
    • ListExtModes returns extension mode descriptors
    • RegisterExtMode dynamically registers new extension modes with a passthrough handler
    • UnregisterExtMode removes dynamically registered extensions (built-in modes protected)
    • PromoteMode promotes extensions to standards-track with optional identifier rename
  • Pluggable authentication chain
    • JWT bearer resolver validates signature, issuer, audience, and expiration against a JWKS (inline JSON or URL-fetched with TTL cache); RS256, ES256, and HS256 supported
    • Static bearer resolver maps opaque tokens to identities via MACP_AUTH_TOKENS_FILE/MACP_AUTH_TOKENS_JSON
    • Resolvers run in chain order (JWT → static); dev-mode fallback only when both are absent
    • Identities carry capability flags: allowed_modes, can_start_sessions, max_open_sessions, can_manage_mode_registry, is_observer
  • Governance policy framework (RFC-MACP-0012)
    • RegisterPolicy, UnregisterPolicy, GetPolicy, ListPolicies, WatchPolicies RPCs
    • Per-mode rule schemas (voting, objection handling, quorum thresholds, acceptance, assignment, handoff acceptance)
    • Policies evaluated at commitment time; version binding enforced at SessionStart
  • Session lifecycle observability
    • ListSessions enumerates current session metadata
    • WatchSessions streams Created/Resolved/Expired events with a Created initial-sync on connect
  • Session extension plumbing
    • SessionExtensionProvider trait and ExtensionProviderRegistry let hosts hook lifecycle callbacks for custom session-level extensions carried in the extensions map; provider errors are non-fatal
  • Pluggable storage backends
    • File (default), in-memory, RocksDB (rocksdb-backend feature), Redis (redis-backend feature)
    • Checkpoint-based replay and terminal-session log compaction
  • Structured logging via tracing
    • use RUST_LOG env var to control log level (e.g. RUST_LOG=info)
  • Per-mode metrics
    • tracked via src/metrics.rs

Implemented modes

Standards-track modes:

  • macp.mode.decision.v1
  • macp.mode.proposal.v1
  • macp.mode.task.v1
  • macp.mode.handoff.v1
  • macp.mode.quorum.v1

Built-in extension modes:

  • ext.multi_round.v1

Runtime behavior that SDKs should assume

Session bootstrap

For all standards-track modes and built-in extensions, SessionStartPayload must include:

  • participants
  • mode_version
  • configuration_version
  • ttl_ms

policy_version is optional unless your policy requires it. Empty mode is rejected. Empty SessionStartPayload is rejected.

Security

In production, requests should be authenticated with a bearer token. The runtime derives Envelope.sender from the authenticated identity and rejects spoofed sender values.

For local development, opt into insecure transport with:

MACP_ALLOW_INSECURE=1

When no auth resolvers are configured (no MACP_AUTH_TOKENS_* and no MACP_AUTH_ISSUER), the runtime falls back to dev-mode auth: any Authorization: Bearer <value> header authenticates the caller as sender <value>. Use only for local development.

Persistence

Unless MACP_MEMORY_ONLY=1 is set, the runtime persists session and log snapshots under MACP_DATA_DIR (default: .macp-data). If a persistence file contains corrupt or incompatible JSON on startup, the runtime logs a warning to stderr and starts with empty state rather than failing.

Configuration

Core server configuration

VariableMeaningDefault
MACP_BIND_ADDRbind address127.0.0.1:50051
MACP_DATA_DIRpersistence directory.macp-data
MACP_MEMORY_ONLYdisable persistence when set to 1unset
RUST_LOGtracing log level filter (e.g. info, debug)unset
MACP_ALLOW_INSECUREallow plaintext transport when set to 1unset
MACP_TLS_CERT_PATHPEM certificate for TLSunset
MACP_TLS_KEY_PATHPEM private key for TLSunset

Authentication and authorization

VariableMeaningDefault
MACP_AUTH_TOKENS_JSONinline static bearer token config JSONunset
MACP_AUTH_TOKENS_FILEpath to static bearer token config JSONunset
MACP_AUTH_ISSUERJWT resolver expected iss claim (enables JWT auth)unset
MACP_AUTH_AUDIENCEJWT resolver expected aud claimmacp-runtime
MACP_AUTH_JWKS_JSONinline JWKS document used to validate JWTsunset
MACP_AUTH_JWKS_URLJWKS endpoint URL (fetched + cached)unset
MACP_AUTH_JWKS_TTL_SECSJWKS cache TTL when fetched from URL300

Auth is layered as a resolver chain: configured JWT first, then static bearer, with a dev-mode fallback only when both are absent. JWT tokens supply MACP scopes via a macp_scopes claim matching the static token schema.

Token JSON may be either a raw list or an object with a tokens array. Example:

{
  "tokens": [
    {
      "token": "demo-coordinator-token",
      "sender": "coordinator",
      "allowed_modes": [
        "macp.mode.decision.v1",
        "macp.mode.quorum.v1"
      ],
      "can_start_sessions": true,
      "max_open_sessions": 25
    },
    {
      "token": "demo-worker-token",
      "sender": "worker",
      "allowed_modes": [
        "macp.mode.task.v1"
      ],
      "can_start_sessions": false,
      "can_manage_mode_registry": false
    }
  ]
}

Resource limits

VariableMeaningDefault
MACP_MAX_PAYLOAD_BYTESmax envelope payload size1048576
MACP_SESSION_START_LIMIT_PER_MINUTEper-sender session start limit60
MACP_MESSAGE_LIMIT_PER_MINUTEper-sender message limit600

Quick start

Production-style startup with TLS

export MACP_TLS_CERT_PATH=/path/to/server.crt
export MACP_TLS_KEY_PATH=/path/to/server.key
export MACP_AUTH_TOKENS_FILE=/path/to/tokens.json
cargo run

Local development startup

export MACP_ALLOW_INSECURE=1
cargo run

With no auth tokens configured, clients authenticate by sending their sender identity as a bearer token (e.g. Authorization: Bearer agent://alice).

Running the example clients

The example clients in src/bin assume the local development startup shown above.

cargo run --bin client
cargo run --bin proposal_client
cargo run --bin task_client
cargo run --bin handoff_client
cargo run --bin quorum_client
cargo run --bin multi_round_client
cargo run --bin fuzz_client

Freeze-profile capability summary

RPCStatus
Initializeimplemented
Sendimplemented
StreamSessionimplemented (active + passive subscribe)
GetSessionimplemented
ListSessionsimplemented
WatchSessionsimplemented
CancelSessionimplemented
GetManifestimplemented
ListModesimplemented
ListExtModesimplemented
RegisterExtModeimplemented
UnregisterExtModeimplemented
PromoteModeimplemented
WatchModeRegistryimplemented
ListRootsimplemented
WatchRootsimplemented
WatchSignalsimplemented
RegisterPolicyimplemented
UnregisterPolicyimplemented
GetPolicyimplemented
ListPoliciesimplemented
WatchPoliciesimplemented

Architecture

Client Request
       |
  [Transport/gRPC] -- server.rs
       |
  [Auth Chain]    -- security.rs, auth/*.rs  (JWT → static → dev fallback)
       |
  [Coordination Kernel] -- runtime.rs
       |
  [Mode Registry] -- mode_registry.rs
       |            \
  [Mode Logic]     [Discovery + Extension Lifecycle]
   mode/*.rs       ListModes, ListExtModes, GetManifest,
                   RegisterExtMode, UnregisterExtMode, PromoteMode
       |
  [Policy Engine] -- policy/*.rs  (commitment-time evaluation)
       |
  [Storage Layer] -- storage/*.rs, log_store.rs
       |
  [Replay] -- replay.rs

See docs/architecture.md for detailed layer descriptions.

Project structure

runtime/
├── src/
│   ├── main.rs             # server startup, TLS, persistence, auth wiring
│   ├── server.rs           # gRPC adapter (22 RPCs) and envelope validation
│   ├── runtime.rs          # coordination kernel, mode dispatch, lifecycle bus
│   ├── mode_registry.rs    # single source of truth for mode registration
│   ├── security.rs         # auth config loader, sender derivation, rate limiting
│   ├── session.rs          # canonical SessionStart validation and session model
│   ├── registry.rs         # session store with optional persistence
│   ├── log_store.rs        # in-memory accepted-history log cache + replay helpers
│   ├── replay.rs           # session rebuild from append-only log
│   ├── stream_bus.rs       # per-session broadcast channels
│   ├── metrics.rs          # per-mode metrics counters
│   ├── auth/               # pluggable auth resolver chain
│   │   ├── chain.rs        # resolver chain driver
│   │   ├── resolver.rs     # AuthResolver trait, ResolvedIdentity
│   │   └── resolvers/
│   │       ├── jwt_bearer.rs    # JWT validation with JWKS (inline or URL cache)
│   │       └── static_bearer.rs # opaque bearer token → identity map
│   ├── extensions/         # session-extension provider plumbing
│   │   ├── provider.rs     # SessionExtensionProvider trait
│   │   └── registry.rs     # ExtensionProviderRegistry
│   ├── mode/               # mode implementations (standards-track + extensions)
│   │   ├── passthrough.rs  # generic handler for dynamically registered extensions
│   │   └── ...
│   ├── policy/             # governance policy framework (RFC-MACP-0012)
│   │   ├── registry.rs     # policy CRUD + broadcast
│   │   ├── evaluator.rs    # per-mode commitment evaluation
│   │   └── rules.rs        # mode-specific rule schemas
│   ├── storage/            # pluggable storage backends
│   │   ├── file.rs         # per-session append-only log + snapshots
│   │   ├── memory.rs       # in-memory backend
│   │   ├── rocksdb.rs      # RocksDB backend (feature-gated)
│   │   ├── redis_backend.rs # Redis backend (feature-gated)
│   │   └── recovery.rs     # crash recovery (.tmp cleanup)
│   └── bin/                # local development example clients
├── tests/
│   ├── integration_mode_lifecycle.rs  # full-stack integration tests
│   ├── replay_round_trip.rs           # replay tests for all modes
│   ├── conformance_loader.rs          # JSON fixture runner
│   └── conformance/                   # per-mode conformance fixtures
├── integration_tests/                 # gRPC boundary tests (Tier 1/2/3)
├── docs/
└── build.rs

Troubleshooting

TLS required error on startup Set MACP_ALLOW_INSECURE=1 for local development, or provide MACP_TLS_CERT_PATH and MACP_TLS_KEY_PATH for production.

InvalidSessionId error Session IDs must be UUID v4/v7 in hyphenated lowercase form (36 chars) or base64url tokens (22+ chars). Short or human-readable IDs like "s1" or "my-session" are rejected.

InvalidPayload on SessionStart For standards-track modes and built-in extensions (including ext.multi_round.v1), SessionStartPayload must include non-empty participants, mode_version, configuration_version, and a positive ttl_ms. Empty payloads are rejected.

Forbidden error Check that the sender identity matches the session's participant list. For Commitment messages, only the session initiator is authorized. Verify your bearer token maps to the correct sender.

StorageFailed error The runtime requires write access to MACP_DATA_DIR. Check directory permissions. Log append failures are fatal — the runtime will not acknowledge a message without a durable record.

Proto version mismatch Update the macp-proto version in Cargo.toml (published on crates.io) and run cargo build.

Testing

cargo test --all-targets          # Unit tests + Rust integration tests
make test-conformance             # JSON fixture-driven conformance suite

A separate integration test crate (integration_tests/) tests the runtime through the real gRPC boundary:

cargo build
cd integration_tests
MACP_TEST_BINARY=../target/debug/macp-runtime cargo test -- --test-threads=1

The integration suite has three tiers:

  • Tier 1 (Protocol) — 74 scripted gRPC tests (including JWT bearer auth, passive subscribe, and policy registry coverage) across all modes, error paths, signals, version binding, dedup, and RFC cross-cutting features
  • Tier 2 (Rig Tools) — 5 tests using Rig agent framework Tool implementations for all MACP operations
  • Tier 3 (E2E) — 3 tests with real OpenAI GPT-4o-mini agents coordinating through the runtime (requires OPENAI_API_KEY)

See docs/testing.md for full details on running locally, in CI, or against a hosted runtime.

Development notes

  • The RFC/spec repository remains the normative source for protocol semantics.
  • Five standards-track modes use the canonical macp.mode.* identifiers.
  • multi_round is a built-in extension (ext.multi_round.v1) — not standards-track, but ships with the runtime and enforces strict SessionStart.
  • Extension modes can be dynamically registered, unregistered, and promoted via RegisterExtMode, UnregisterExtMode, and PromoteMode RPCs.
  • StreamSession is enabled and binds one gRPC stream to one session, emitting accepted envelopes in order.
  • WatchSignals broadcasts ambient Signal envelopes to all subscribers in real time.

See docs/README.md and docs/examples.md for the updated local development and usage guidance.