monarchic / agent-protocol
Monarchic Agent Protocol protobuf bindings for PHP.
Package info
github.com/monarchic-ai/monarchic-agent-protocol
Language:C#
pkg:composer/monarchic/agent-protocol
Requires
- php: >=7.4
- google/protobuf: ^3.25
- dev-main
- 0.1.16
- 0.1.15
- 0.1.14
- 0.1.13
- 0.1.12
- 0.1.11
- 0.1.10
- 0.1.9
- 0.1.7
- 0.1.6
- 0.1.4
- v0.1.3
- 0.1.1
- dev-release/protocol-0.1.16
- dev-push-uqzxuwrmopnp
- dev-ci/update-generated-artifacts-23629338097
- dev-ci/update-generated-artifacts-23626384039
- dev-midischwarz12-verification-role-protocol
- dev-midischwarz12-mailbox-ack-semantics
- dev-midischwarz12-runner-message-protocol
- dev-midischwarz12-canonical-pipeline-docs
- dev-protocol-contract-canonical-lock
- dev-midischwarz12
This package is auto-updated.
Last update: 2026-04-01 18:07:51 UTC
README
This repository defines the shared, versioned protocol for Monarchic AI. It is the compatibility layer between the orchestrator, runner, and agent roles, so the schemas are minimal and stable while allowing forward-compatible extensions.
Overview
- Provide versioned JSON Schemas for language-agnostic validation.
- Provide Rust, TypeScript, and Protobuf bindings that mirror the schemas.
- Keep the protocol small and explicit for v1 interoperability.
Usage
Quickstart
Install the published package for your language, then use the generated bindings.
Install
- Rust (crates.io):
cargo add monarchic-agent-protocol - TypeScript (npm):
npm install @monarchic-ai/monarchic-agent-protocol - Python (PyPI):
pip install monarchic-agent-protocol - Ruby (RubyGems):
gem install monarchic-agent-protocol - Go (Go modules):
go get github.com/monarchic-ai/monarchic-agent-protocol/src/go@vX.Y.Z - Java/Kotlin (JitPack):
implementation("com.github.monarchic-ai:monarchic-agent-protocol:vX.Y.Z") - .NET (NuGet):
dotnet add package Monarchic.AgentProtocol - PHP (Packagist):
composer require monarchic-ai/monarchic-agent-protocol
Examples
- Rust:
examples/rust/task.rs - TypeScript:
examples/ts/task.ts - JSON (non-protobuf):
examples/json/objective_spec.minimal.json - Protobuf C++:
examples/proto/cpp/task.cpp - Protobuf Java:
examples/proto/java/TaskExample.java - Protobuf Kotlin:
examples/proto/kotlin/TaskExample.kt - Protobuf C#:
examples/proto/csharp/TaskExample.cs - Protobuf Python:
examples/proto/python/task.py - Protobuf Ruby:
examples/proto/ruby/task.rb - Protobuf PHP:
examples/proto/php/task.php - Protobuf Dart:
examples/proto/dart/task.dart - Protobuf Rust:
examples/proto/rust/task.rs
Non-protobuf language support
For languages that do not use protobuf bindings, exchange protocol objects as JSON and validate payloads against the versioned schemas before handoff.
- Canonical JSON example for non-protobuf consumers:
examples/json/objective_spec.minimal.json - Validate a typed payload against a specific schema:
bash scripts/validate-protocol-json.sh schemas/v1/objective_spec.json schemas/fixtures/valid/objective_spec.minimal.json - Validate the canonical non-protobuf JSON example:
bash scripts/validate-protocol-json.sh schemas/v1/objective_spec.json examples/json/objective_spec.minimal.json
Project-state contract fixtures used by the shell verification suite live under fixtures/project-state/, not the repo root.
Versioning
- Protocol versions live under
schemas/v1/. - Each v1 object requires
version: "v1". - New versions must be added under a new directory (e.g.
schemas/v2/) without changing existing v1 files.
Client boundary contracts
The Rust crate also exposes a frozen client-boundary surface under monarchic_agent_protocol::client_boundary.
Frozen v1 client-boundary types:
IntentPlanPlanStepExecutionReceiptVerificationReceiptReviewDecisionRerunScopeBlockedOutcomeArtifactDescriptor
Canonical JSON fixtures for these contracts live under fixtures/client_boundary/v1/.
Legacy runtime compatibility fixtures live under fixtures/client_boundary/v0/.
Durable authority contracts
The Rust crate also exposes a frozen durable-authority surface under monarchic_agent_protocol::durable_authority.
Frozen v1 durable-authority types:
FencingTokenLeaseRunLifecycleStateStepLifecycleStateLeaseRejectionReasonRecoveryEvent
Canonical JSON fixtures for these contracts live under fixtures/durable_authority/v1/.
Schema summary
JSON Schema files are generated from the protobuf definitions. Do not edit them by hand.
Schema files live under schemas/v1/:
schemas/v1/task.jsonschemas/v1/artifact.jsonschemas/v1/event.jsonschemas/v1/gate_result.jsonschemas/v1/failure_class.jsonschemas/v1/plan_status.jsonschemas/v1/failure_detail.jsonschemas/v1/role_provenance.jsonschemas/v1/plan_provenance.jsonschemas/v1/plan_step.jsonschemas/v1/plan.jsonschemas/v1/execution_receipt.jsonschemas/v1/run_context.jsonschemas/v1/run_outcome.jsonschemas/v1/delivery_contract.jsonschemas/v1/agent_role.jsonschemas/v1/dataset_ref.jsonschemas/v1/experiment_spec.jsonschemas/v1/objective_spec.jsonschemas/v1/eval_result.jsonschemas/v1/provenance.jsonschemas/v1/schema.json(index)schemas/v1/monarchic_agent_protocol.proto
All schemas allow additional properties for forward compatibility.
Schema index coverage
schemas/v1/schema.json is the canonical top-level JSON schema index. Its oneOf entries currently cover:
schemas/v1/task.jsonschemas/v1/artifact.jsonschemas/v1/event.jsonschemas/v1/gate_result.jsonschemas/v1/failure_class.jsonschemas/v1/plan_status.jsonschemas/v1/failure_detail.jsonschemas/v1/role_provenance.jsonschemas/v1/plan_provenance.jsonschemas/v1/plan_step.jsonschemas/v1/plan.jsonschemas/v1/execution_receipt.jsonschemas/v1/run_context.jsonschemas/v1/dataset_ref.jsonschemas/v1/experiment_spec.jsonschemas/v1/objective_spec.jsonschemas/v1/eval_result.jsonschemas/v1/provenance.json
schemas/v1/agent_role.json is a shared schema used by task.json.
schemas/v1/failure_class.json is a shared schema used by event.json and gate_result.json.
TaskMessage and TaskMessageAck
These types define the shared contract for orchestrator-mediated runner communication.
They are intended for:
- durable handoff messages between active tasks
- clarification requests and responses
- blocker notices
- artifact-ready notifications
- explicit acknowledgement state
They are not intended to imply direct peer-to-peer runner transport. The protocol defines the message shape, but routing, persistence, and delivery are owned by the orchestrator.
TaskMessage carries:
- sender and recipient task ids
- message kind
- optional subject/body
- referenced artifact ids
- optional reply chaining
- acknowledgement requirement
TaskMessageAck records recipient acknowledgement state separately so mailbox
delivery can remain append-only and auditable.
Recommended acknowledgement semantics:
received: the recipient has seen the message in its inboxaccepted: the recipient accepts the request and plans to act on itrejected: the recipient explicitly declines or cannot act on itresolved: the recipient completed the requested follow-up or supplied the final response
Recommended routing semantics:
- message ids should be unique within one run
- sender and recipient should be tasks from the same run
reply_to, when present, should reference an earlier message id from the same run logrequires_ack=trueshould imply at least one correspondingTaskMessageAckrecord from the recipient
AgentRole
Enum values:
product_ownerproject_managerdevqareviewersecurityopspublisher
Example:
{
"role": "reviewer"
}
PipelineSpec
Represents a planned pipeline before execution.
Required fields:
version:"v1"pipeline_id: stable identifierobjective: human-readable campaign or pipeline objectiveproject_key: member/project scope identifiertasks: orderedPipelineTask[]
This is the shared planning shape that bootstrap generation, orchestration validation, and UI preview should converge on.
Current shared planning fields now include:
PipelineSpecPipelineTaskTaskDependencySkillRefRoleDefinitionResolvedRoleBundle
These are available in the protobuf and language bindings even where the checked-in JSON Schema index has not yet been expanded to cover each planning helper type.
RoleDefinition and ResolvedRoleBundle
These types provide the shared contract between:
- role catalogs in
monarchic-agent-roles - orchestration-time validation
- runner-time execution bundles
RoleDefinition describes a canonical role, its capabilities, and its declared
skill requirements. ResolvedRoleBundle is the runtime handoff shape that can
pair a concrete role definition with the resolved skills and rendered template
path used for one task execution.
Canonical Pipeline Layout
PipelineSpec and PipelineTask are now the canonical role-aware planning
layout across the stack.
For compatibility, older minimal pipeline files may still only carry:
pipeline_idtasks[].idtasks[].task
But once a pipeline opts into the role-aware contract by declaring any of:
objectiveproject_keytasks[].roletasks[].goaltasks[].required_skills
the intended canonical shape is:
PipelineSpec.objective: required, non-emptyPipelineSpec.project_key: required, non-emptyPipelineTask.role: required, non-emptyPipelineTask.goal: required, non-emptyPipelineTask.required_skills: optional list ofSkillRef, but when present it must be internally well-formed and deduplicated
This is the contract monarch should generate, monarchic-orchestrator should
validate, and monarchic-runner should ultimately execute through resolved role
bundles.
Task
Represents work assigned to an agent.
Required fields:
version:"v1"task_id: stable identifierrole:AgentRolegoal: human-readable objective
Optional fields:
inputs: free-form objectconstraints: free-form objectgates_required: list of gate names to run (ex:["qa", "security"])run_context:RunContextobjective_spec: objective scoring contract for deterministic outcome evaluationexperiment_spec: typed experiment design contract for deterministic in silico runs
Example:
{
"version": "v1",
"task_id": "task-123",
"role": "dev",
"goal": "Implement protocol types",
"inputs": {
"issue": "https://example.com/issues/42"
},
"constraints": {
"no_network": true
},
"gates_required": ["qa", "security"],
"run_context": {
"version": "v1",
"repo": "monarchic-agent-protocol",
"worktree": "/worktrees/task-123",
"image": "ghcr.io/monarchic/runner:stable",
"runner": "vm-runner-01",
"labels": ["linux", "rust"]
}
}
DeliveryContract
Typed acceptance contract for autonomous delivery execution.
Required fields:
objective: plain-language objective statementdefinition_of_done: ordered completion checklistrequired_checks: required gate/check names for merge readinessrisk_tier:low | medium | high | critical
Optional fields include cycle/turn budgets (max_cycle_minutes, max_agent_turns) and PR/review/rollback strategy hints.
RunContext
Execution hints for a runner.
Required fields:
version:"v1"repo: repository identifier or URLworktree: worktree path or identifierimage: VM/container image referencerunner: runner identifier
Optional fields:
labels: list of labels or tags
Example:
{
"version": "v1",
"repo": "monarchic-agent-protocol",
"worktree": "/worktrees/task-123",
"image": "ghcr.io/monarchic/runner:stable",
"runner": "vm-runner-01",
"labels": ["linux", "rust"]
}
Artifact
Outputs produced by an agent or runner.
Required fields:
version:"v1"artifact_id: stable identifiertype: artifact type (ex:patch,log,report)summary: short descriptionpath: path or locator for the artifacttask_id: task identifier that produced itprovenance: typed provenance hashes and runtime metadatadataset_refs: datasets used while producing the artifacteval_results: typed metric outputs with optional uncertainty boundsexperiment_spec: optional copy of experiment contract used for this output
Example:
{
"version": "v1",
"artifact_id": "artifact-987",
"type": "patch",
"summary": "Adds v1 protocol schemas",
"path": "artifacts/task-123/patch.diff",
"task_id": "task-123"
}
Event
Lifecycle state updates.
Required fields:
version:"v1"event_type: event categorytimestamp: ISO 8601 timestamptask_id: task identifierstatus: state label
Optional fields:
message: human-readable detailsprovenance: typed runtime/source hashes for event attributioneval_results: optional metric snapshot payloadsfailure_class: typed failure taxonomy payload for machine-actionable triage
Example:
{
"version": "v1",
"event_type": "task_started",
"timestamp": "2025-01-14T15:04:05Z",
"task_id": "task-123",
"status": "running",
"message": "Runner started VM"
}
GateResult
Outcome of QA, review, security, or other gates.
Required fields:
version:"v1"gate: gate namestatus: pass/fail or other gate-specific status
Optional fields:
reason: short explanationfailure_class: typed failure taxonomy payload for deterministic failure routingevidence: free-form object with supporting data
Example:
{
"version": "v1",
"gate": "security",
"status": "pass",
"reason": "No high or critical findings",
"evidence": {
"scanner": "trivy",
"report_path": "artifacts/task-123/security.json"
}
}
FailureClass
Typed taxonomy payload for classifying protocol failures.
Required fields:
category:validation,dependency,environment,timeout,conflict,permission,resource,internal, orunknowncode: stable machine-readable failure coderetryable: whether automated retry is expected to be useful
Optional fields include detail, scope, source, and next_action.
PlanStatus
Plan lifecycle status used for typed execution plans and receipts.
Allowed values:
unspecifieddraftplannedexecutingcompleteboundedfailedcancelledunknown
FailureDetail
Failure detail attached to a plan or receipt.
Required fields:
class: one ofvalidation,execution,agent,infra,policy, orunknowncode: machine-readable failure codemessage: operator-readable failure message
Optional fields:
details: bounded extension object with implementation diagnostics
RoleProvenance
Role metadata for deterministic role-template binding.
Required fields:
role_nametemplate_hashrender_hash
PlanProvenance
Generation metadata for a plan and policy context.
Required fields:
generated_bygenerated_at_ms
Optional fields:
policy_profilerole
PlanStep
Execution step in a plan, with dependency and template fields.
Required fields:
step_iddescriptiontask_template
Optional fields:
depends_onfailure
Plan
Canonical plan contract.
Required fields:
contract_version: required contract tag (for now"v1")plan_idobjectivestatuscreated_at_msupdated_at_msprovenancesteps
Optional fields:
run_id
ExecutionReceipt
Deterministic execution contract for a run.
Required fields:
contract_version: required contract tag (for now"v1")run_idplan_idplan_hashtask_hashesartifact_hashesoutcome_hashstatusgenerated_at_ms
Optional fields:
failure
DatasetRef
Reference to a dataset used by an experiment or output artifact.
Required fields:
dataset_idsha256format
Optional fields include uri, split, size_bytes, and description.
ExperimentSpec
Typed contract for model design and acceptance checks.
Required fields:
experiment_idobjectivedataset_refs: list ofDatasetRefacceptance: metric threshold policy
Optional fields include hypothesis, model_family, seeds, and free-form constraints.
ObjectiveSpec
Typed objective scoring contract for progress/outcome checks.
Required fields:
metric_keydirection:maximize,minimize, ortarget
Optional fields include target, min_delta, tolerance, report_file,
report_task_id, weight, and description.
EvalResult
Typed evaluation output row.
Required fields:
metricvaluepassed
Optional fields include lower_ci, upper_ci, variance, seed, and notes.
Provenance
Typed provenance contract for reproducibility and traceability.
Required fields:
prompt_sha256code_sha256runtimerunnerorchestratorcreated_at
Optional fields include dataset hashes/references and command/task/pipeline hashes.
Rust
The crate lives at the repo root with sources under src/rust/lib.rs.
use monarchic_agent_protocol::{AgentRole, Task, PROTOCOL_VERSION}; let task = Task { version: PROTOCOL_VERSION.to_string(), task_id: "task-123".to_string(), role: AgentRole::Dev as i32, role_id: "dev".to_string(), goal: "Implement protocol".to_string(), inputs: None, constraints: None, gates_required: Vec::new(), run_context: None, extensions: Default::default(), };
TypeScript
TypeScript bindings are in src/ts/index.ts.
import { Task } from "./src/ts/index"; const task: Task = { version: "v1", task_id: "task-123", role: "dev", goal: "Implement protocol", };
Go
Go module sources live under src/go with module path:
github.com/monarchic-ai/monarchic-agent-protocol/src/go
Protobuf
The v1 protobuf schema lives at schemas/v1/monarchic_agent_protocol.proto. Its portable object messages mirror the JSON schema and use google.protobuf.Struct for free-form objects (inputs, constraints, evidence, extensions). Additional JSON properties should be stored in the extensions field on each message.
The protobuf file also contains transport-only service definitions for machine-to-machine control-plane RPC, starting with RunnerControlService. Those protobuf-only contracts cover registration, heartbeats, lease acquisition, lease renewal, lease resume, step progress/outcome reporting, and cancellation acknowledgement, and they are not mirrored into the JSON schema index.
The Rust crate published from this repository currently exports protobuf message types. Runtime repositories that need gRPC client/server bindings should generate transport stubs from the canonical proto with their chosen toolchain, such as tonic-build.
Language packages are published per registry. Use the registry package for your language instead of generating local outputs.
Python (PyPI)
Install the published package and import the generated protobuf bindings:
from monarchic_agent_protocol import monarchic_agent_protocol_pb2 as map_pb2
Ruby
Ruby bindings live under src/ruby.
Java/Kotlin
Java/Kotlin sources live under src/java.
C#
C# sources live under src/csharp.
PHP
PHP sources live under src/php.
Dart
Dart sources live under src/dart.
Contributing
Tooling
nix developprovides Rust, Node, jq, Pythonjsonschema, andprotoc.nix flake checkvalidates JSON schemas, protobuf codegen, and package imports (PyPI + Rust + npm + Go).- JSON Schema test:
scripts/test-json-schema.sh. - Language-agnostic schema validation helper:
scripts/validate-protocol-json.sh. - Language-agnostic schema validator regression test:
scripts/test-validate-protocol-json.sh. - Pre-commit schema JSON parse check:
scripts/pre-commit-schema-json-parse.sh. - Pre-commit schema parse smoke test:
scripts/test-pre-commit-schema-json-parse.sh. - Schema edit changelog:
schemas/SCHEMA_CHANGELOG.md. - Schema changelog format test:
scripts/test-schema-changelog-format.sh. - README schema index coverage test:
scripts/test-readme-schema-index-coverage.sh. - README examples coverage test:
scripts/test-readme-examples-coverage.sh. - README/examples examples synchronization test:
scripts/test-readme-examples-sync.sh. - Protobuf codegen test (all languages):
scripts/test-proto.sh. - Protobuf availability smoke test:
scripts/test-proto-availability-smoke.sh. - Protobuf codegen (write to
src/<lang>):scripts/generate-proto.sh. - Protobuf codegen (write to
src/<lang>and regenerate JSON schemas):scripts/generate-proto.sh. - JSON Schema regeneration only:
scripts/generate-json-schema.sh. - JSON Schema generation requires
protoc-gen-jsonschema(install withgo install github.com/chrusty/protoc-gen-jsonschema/cmd/protoc-gen-jsonschema@latest).
Schema validation workflow
- Run full schema lint and semantic checks:
bash scripts/lint-schemas.sh. - Run direct schema fixture checks:
bash scripts/test-json-schema.sh. - Validate language-agnostic payloads through JSON schema:
bash scripts/validate-protocol-json.sh schemas/v1/objective_spec.json schemas/fixtures/valid/objective_spec.minimal.json. - Verify schema validator behavior is deterministic:
bash scripts/test-validate-protocol-json.sh. - Validate staged schema JSON before commit:
bash scripts/pre-commit-schema-json-parse.sh. - Verify pre-commit checker behavior is deterministic:
bash scripts/test-pre-commit-schema-json-parse.sh. - Verify schema changelog entry format:
bash scripts/test-schema-changelog-format.sh. - Verify README schema index coverage stays aligned:
bash scripts/test-readme-schema-index-coverage.sh. - Verify README examples coverage for non-protobuf and protobuf paths:
bash scripts/test-readme-examples-coverage.sh. - Verify README and examples/README example entries stay synchronized:
bash scripts/test-readme-examples-sync.sh.
Nix packages
packages.default: Rust crate for protocol typespackages.rs-lib: Rust crate for protocol types (local)packages.rs-registry-lib: Rust crate from crates.io (registry)packages.py-lib: installable Python package (local)packages.py-registry-lib: PyPI package (registry)packages.ts-lib: TypeScript types package (local)packages.ts-registry-lib: npm registry package (types-only)packages.go-lib: Go module (local)packages.go-registry-lib: Go module from GitHub (registry)packages.rb-lib: Ruby gem (local)packages.rb-registry-lib: Ruby gem from RubyGems (registry)packages.java-lib: Java/Kotlin jar (local)packages.java-registry-lib: Java/Kotlin jar from JitPack (registry)packages.dart-lib: Dart package (local)packages.dart-registry-lib: Dart package from pub.dev (registry)packages.csharp-lib: C# package sources (local)packages.csharp-registry-lib: C# package from NuGet (registry)packages.php-lib: PHP package sources (local)packages.php-registry-lib: PHP package from Packagist (registry)
CI and releases
.github/workflows/ci.ymlvalidates JSON schemas, protobuf codegen, and runscargo test..github/workflows/release.ymlpublishes language packages.- Python publishing is implemented for PyPI; other language registry steps are scaffolded.
License
LGPL-3.0-only