Skip to main content

Rust kernel with Python bindings for the Amplifier modular AI agent framework

Project description

Amplifier Core

The ultra-thin kernel of the Amplifier modular AI agent system -- now implemented in Rust with Python bindings via PyO3.

Purpose

Amplifier Core provides the mechanisms for building modular AI agent systems. Following the Linux kernel model, it's a tiny, stable center that rarely changes, with all policies and features implemented as replaceable modules at the edges.

The kernel is implemented in Rust for performance and type safety. Python bindings via PyO3 provide the same API that existing consumers already use -- existing Python code requires zero changes. Same imports, same API, same behavior.

Core responsibilities:

  • Module discovery and loading
  • Lifecycle coordination
  • Hook system and events
  • Session management
  • Stable contracts and APIs

Architecture

+---------------------------------------------------------------+
| RUST KERNEL (crates/amplifier-core/)                          |
| * Session lifecycle       * Event system                      |
| * Coordinator             * Hook registry                     |
| * Type-safe contracts     * Cancellation tokens               |
+----------------------------+----------------------------------+
                             | PyO3 bridge (bindings/python/)
                             v
+---------------------------------------------------------------+
| PYTHON BINDINGS (python/amplifier_core/)                      |
| * Same public API          * Pydantic models                  |
| * Module loader (Python)   * Backward-compatible imports      |
+----------------------------+----------------------------------+
                             | protocols (Tool, Provider, etc.)
                             v
+---------------------------------------------------------------+
| MODULES (Userspace - Swappable)                               |
| * Providers: LLM backends (Anthropic, OpenAI, Azure, Ollama) |
| * Tools: Capabilities (filesystem, bash, web, search)        |
| * Orchestrators: Execution loops (basic, streaming, events)  |
| * Contexts: Memory management (simple, persistent)           |
| * Hooks: Observability (logging, redaction, approval)        |
+---------------------------------------------------------------+

Rust Kernel

The kernel is implemented in Rust for performance and type safety. Key details:

  • Rust crate: crates/amplifier-core/ -- pure Rust kernel with all core types, traits, and engine logic
  • PyO3 bridge: bindings/python/ -- thin Python bindings that expose Rust types to Python
  • Python source: python/amplifier_core/ -- Pydantic models, module loader, and backward-compatible API surface

The RUST_AVAILABLE flag (on amplifier_core._engine) indicates whether the Rust engine loaded successfully. When available:

  • Top-level imports (from amplifier_core import AmplifierSession) return Rust-backed types
  • Submodule imports (from amplifier_core.session import AmplifierSession) return Python types for backward compatibility
  • HookRegistry uses the Rust implementation for all hook dispatch
  • CancellationToken uses the Rust implementation

For consumers, this is transparent -- the API is identical regardless of which implementation is active.

Design Philosophy

Mechanisms, Not Policies

The kernel provides capabilities without decisions:

Kernel Provides (Mechanism) Modules Decide (Policy)
Module loading Which modules to load
Event emission What to log, where
Session lifecycle Orchestration strategy
Hook registration Security policies

Litmus test: "Could two teams want different behavior?" -> If yes, it's policy -> Module, not kernel.

Stability Guarantees

  • Backward compatible: Existing modules continue working across kernel updates
  • Minimal runtime dependencies: Only pydantic, pyyaml, typing-extensions (unchanged for consumers)
  • Single maintainer scope: Can be understood by one person
  • Additive evolution: Changes extend, don't break

Installation

For consumers

pip install amplifier-core

This installs a pre-built wheel with the Rust kernel included. No Rust toolchain required.

For complete Amplifier installation and usage: -> https://github.com/microsoft/amplifier

For developers

Building from source requires the Rust toolchain:

# Install Rust (if not already installed)
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh

# Build and install in development mode
pip install maturin
maturin develop

# Or with uv
uv run maturin develop

See docs/RUST_CORE_TESTING.md for the full development setup guide.

Build dependencies: Rust 1.70+, maturin

Core Concepts

Session

Execution context with mounted modules and conversation state. Lifespan: initialize() -> execute() -> cleanup().

Mount Plan

Configuration dictionary specifying which modules to load and their configuration. Apps/bundles compile to Mount Plans.

Coordinator

Infrastructure context providing session_id, config access, hooks, and mount points. Injected into all modules.

Module Types

All modules use Python Protocol (structural typing, no inheritance required):

  • Provider - LLM backends (name, complete(), parse_tool_calls(), get_info(), list_models())
  • Tool - Agent capabilities (name, description, execute())
  • Orchestrator - Execution loops (execute())
  • ContextManager - Memory (add_message(), get_messages(), compact())
  • Hook - Observability (call(event, data) -> HookResult)

API Example

from amplifier_core import AmplifierSession

# Define mount plan (modules must be installed or discoverable)
config = {
    "session": {
        "orchestrator": "loop-basic",
        "context": "context-simple"
    },
    "providers": [
        {"module": "provider-anthropic"}
    ],
    "tools": [
        {"module": "tool-filesystem"},
        {"module": "tool-bash"}
    ]
}

# Create and use session
async with AmplifierSession(config) as session:
    response = await session.execute("List files in current directory")

Module Development

Modules implement protocols via structural typing (duck typing):

from amplifier_core.interfaces import Tool
from amplifier_core.models import ToolResult

class MyTool:
    """Implements Tool protocol without inheritance."""

    @property
    def name(self) -> str:
        return "my_tool"

    @property
    def description(self) -> str:
        return "Does something useful"

    async def execute(self, input: dict) -> ToolResult:
        """Execute tool with input dict."""
        return ToolResult(
            output=f"Processed: {input.get('param')}",
            error=None
        )

# Mount function (entry point)
async def mount(coordinator, config):
    tool = MyTool()
    await coordinator.mount("tools", tool, name="my_tool")

    async def cleanup():
        pass  # Cleanup resources

    return cleanup

Entry point (pyproject.toml):

[project.entry-points."amplifier.modules"]
my-tool = "amplifier_module_my_tool:mount"

For complete module development guide: -> https://github.com/microsoft/amplifier

Documentation

Rust/Python Type Mapping:

  • CONTRACTS.md - Authoritative Rust/Python type mapping for the PyO3 boundary

Module Contracts (Entry Point for Developers):

Specifications (Detailed Design):

Detailed Guides:

Philosophy:

Testing

# Rust kernel tests
cargo test -p amplifier-core

# Python tests (includes binding tests)
uv run pytest tests/ bindings/python/tests/ -q --tb=short

# Full coverage
uv run pytest tests/ bindings/python/tests/ --cov

# Validate Rust kernel integration
uv run python tests/validate_rust_kernel.py

Contributing

[!NOTE] This project is not currently accepting external contributions, but we're actively working toward opening this up. We value community input and look forward to collaborating in the future. For now, feel free to fork and experiment!

Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit Contributor License Agreements.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

amplifier_core-1.3.3-cp314-cp314t-win_arm64.whl (7.7 MB view details)

Uploaded CPython 3.14tWindows ARM64

amplifier_core-1.3.3-cp313-cp313t-win_arm64.whl (7.7 MB view details)

Uploaded CPython 3.13tWindows ARM64

amplifier_core-1.3.3-cp311-abi3-win_arm64.whl (7.7 MB view details)

Uploaded CPython 3.11+Windows ARM64

amplifier_core-1.3.3-cp311-abi3-win_amd64.whl (8.9 MB view details)

Uploaded CPython 3.11+Windows x86-64

amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (8.6 MB view details)

Uploaded CPython 3.11+manylinux: glibc 2.17+ x86-64

amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (7.6 MB view details)

Uploaded CPython 3.11+manylinux: glibc 2.17+ ARM64

amplifier_core-1.3.3-cp311-abi3-macosx_11_0_arm64.whl (7.2 MB view details)

Uploaded CPython 3.11+macOS 11.0+ ARM64

amplifier_core-1.3.3-cp311-abi3-macosx_10_12_x86_64.whl (8.1 MB view details)

Uploaded CPython 3.11+macOS 10.12+ x86-64

File details

Details for the file amplifier_core-1.3.3-cp314-cp314t-win_arm64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp314-cp314t-win_arm64.whl
Algorithm Hash digest
SHA256 2407881ca22feb23f92f7b2606b7b5e99f7f4fccf8b9908dad6c0640ee6a3f64
MD5 01793a4cd5241ad072b983c77b8f4cdd
BLAKE2b-256 3636ff422fab371c63bde16c8fb2f913265a9e2d2fef61bcce665a5d59124907

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp314-cp314t-win_arm64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp313-cp313t-win_arm64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp313-cp313t-win_arm64.whl
Algorithm Hash digest
SHA256 883779eb5acf298048a6afa3178a59cfc29d1f05c413d8446e0f6f2340cda794
MD5 0ea68a13fb402f25db811235295e85b7
BLAKE2b-256 ab9a61003612d9c94b22dd4470f0fe82c1e68f52e7868c8f76b71cdc76471665

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp313-cp313t-win_arm64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-win_arm64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-win_arm64.whl
Algorithm Hash digest
SHA256 263c43010e1e78668ff34ecddfa0444727bd9a8787d8dc2286a8d3fa619b48de
MD5 7ca00790de910f7b20426d2e62f1b136
BLAKE2b-256 6380816f0aec391e20218340fe108c95208e236297c80903d58a9290d83c902c

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-win_arm64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-win_amd64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-win_amd64.whl
Algorithm Hash digest
SHA256 c09cadb6fe104645386742ebef893f549ffa779f7acc7ec42d5bd949348f2eea
MD5 77ca862025ec4252ca90e4b3ad1fa0b6
BLAKE2b-256 856209d8c57fd97bd9b9e5851da13cd902fc431c80d7a364476b8aae70f2b2c0

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-win_amd64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 09adf35c52461b297b1aef119dda6c8b209af1b2eb82bd00702c228db8458937
MD5 b14e853eb33f2cbb959e0824a812426e
BLAKE2b-256 16037299e57a263f6ef3a77dc9fd94384f4b9f7e44111a0119037c1b0ea25e69

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 2e6b1ce4c39993d1aa510719051d1864726ba603179a0ed830180d3b6798cc55
MD5 b75dc10636266268608944e86510c051
BLAKE2b-256 3bbc80abe390d5023b2bedb0e79235075c43dc6dfd93fa5d6819f674157a71fb

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 514edd6fcb59299049730ecf7e5fc1760ac8be73b8ac35c72aafbebb1caf4e92
MD5 7e8e41c650af64496a70a9d686026e64
BLAKE2b-256 3b190348e6b9e7731f5d17ec15cfc155118f12602bd13be264f511d7d262d973

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-macosx_11_0_arm64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file amplifier_core-1.3.3-cp311-abi3-macosx_10_12_x86_64.whl.

File metadata

File hashes

Hashes for amplifier_core-1.3.3-cp311-abi3-macosx_10_12_x86_64.whl
Algorithm Hash digest
SHA256 eef372360758b28966bde5488422ce097b1c12cae2bdd5f0736dbc5eb19e6f6c
MD5 28950d256a9cf743f68b258b2c02dbbb
BLAKE2b-256 5d9bc1831daf9f19f819c552fe8a9fd1c11366413e543b1d2b41c60f910c4f1b

See more details on using hashes here.

Provenance

The following attestation bundles were made for amplifier_core-1.3.3-cp311-abi3-macosx_10_12_x86_64.whl:

Publisher: rust-core-wheels.yml on microsoft/amplifier-core

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page