Codex A2A runtime adapter
Project description
codex-a2a
Expose Codex through A2A.
codex-a2a adds an A2A runtime layer to the local Codex runtime, with auth, streaming, session continuity, interrupt handling, a built-in outbound A2A client, and a clear deployment boundary.
What This Is
- An A2A adapter service for the local Codex runtime, with inbound runtime exposure plus outbound peer calling.
- It supports both roles in one process: serving as an A2A Server and hosting an embedded A2A Client for
a2a_calland CLI-driven peer calls.
Architecture
flowchart TD
External["A2A Clients / a2a-client-hub / Gateways"]
subgraph Adapter["codex-a2a Runtime"]
Ingress["Inbound A2A Surface\nHTTP+JSON + JSON-RPC"]
Codex["Codex Runtime / Executor"]
Outbound["Embedded A2A Client\nCLI call + a2a_call"]
end
subgraph Peers["Peer A2A Services"]
PeerA2A["Peer A2A Agent"]
PeerRuntime["Peer Runtime"]
PeerA2A --> PeerRuntime
end
External -->|message/send,\nmessage:stream| Ingress
Ingress -->|task execution| Codex
Codex -->|stream events / tool results| Ingress
Codex -->|a2a_call tool| Outbound
Outbound -->|message/send,\nmessage:stream| PeerA2A
PeerA2A -->|task / stream result| Outbound
For internal module boundaries and maintainer-facing request call chains, see Maintainer Architecture Guide.
Quick Start
Install the released CLI with uv tool:
uv tool install codex-a2a
Upgrade later with:
uv tool upgrade codex-a2a
Install an exact release with:
uv tool install "codex-a2a==<version>"
Before starting the runtime:
- Install and verify the local
codexCLI itself. - Configure Codex with a working provider/model setup and any required credentials.
codex-a2adoes not provision Codex providers, login state, or API keys for you.- Startup fails fast if the local
codexruntime is missing or cannot initialize.
Self-start the released CLI against a workspace root:
DEMO_BEARER_TOKEN="$(python -c 'import secrets; print(secrets.token_hex(24))')"
A2A_STATIC_AUTH_CREDENTIALS='[{"id":"local-bearer","scheme":"bearer","token":"'"${DEMO_BEARER_TOKEN}"'","principal":"automation"}]' \
A2A_HOST=127.0.0.1 \
A2A_PORT=8000 \
A2A_PUBLIC_URL=http://127.0.0.1:8000 \
A2A_DATABASE_URL=sqlite+aiosqlite:////abs/path/to/workspace/.codex-a2a/codex-a2a.db \
CODEX_WORKSPACE_ROOT=/abs/path/to/workspace \
codex-a2a
For the full runtime configuration matrix, outbound client settings, and deployment notes, see Usage Guide.
Operational Notes
When A2A_DATABASE_URL is unset and CODEX_WORKSPACE_ROOT is configured, the default SQLite database is created under ${CODEX_WORKSPACE_ROOT}/.codex-a2a/codex-a2a.db.
On startup, codex-a2a auto-creates its own runtime-state tables and applies versioned runtime-state schema migrations in place. This migration ownership currently covers only the adapter-managed a2a_* runtime-state tables and intentionally excludes the A2A SDK task-store schema.
YOLO-equivalent startup note:
codex-a2adoes not add a separate--yoloflag orYOLOenvironment variable.- To start the underlying Codex process with YOLO-equivalent behavior, set:
CODEX_APPROVAL_POLICY=neverCODEX_SANDBOX_MODE=danger-full-access
A2A_EXECUTION_*settings are discovery metadata only and do not change how the Codex subprocess starts.
Agent Card: http://127.0.0.1:8000/.well-known/agent-card.json
Authenticated extended card:
- JSON-RPC:
agent/getAuthenticatedExtendedCard - HTTP:
GET /v1/card
Outbound peer auth is configured with A2A_CLIENT_BEARER_TOKEN or A2A_CLIENT_BASIC_AUTH; see the Usage Guide for the complete client-side matrix.
When To Use It
Use this project when:
- you want to keep Codex as the runtime
- you need A2A transports and Agent Card discovery
- you want a thin service boundary instead of building your own adapter
- you want inbound serving and outbound peer access in one deployable unit
Prefer a2a-client-hub when:
- you need a broader application-facing client integration layer
- you want higher-level A2A consumption and upstream adapter normalization
- you want client-side integration concerns separated from the Codex runtime boundary
Look elsewhere if:
- you need hard multi-tenant isolation inside one shared runtime
- you want this project to manage your process supervisor or host bootstrap
- you want a general runtime-agnostic A2A server rather than a Codex adapter
Highlights
- A2A HTTP+JSON endpoints such as
/v1/message:sendand/v1/message:stream - A2A JSON-RPC support on
POST / - Embedded client access through
codex-a2a call - Autonomous outbound peer calls through the
a2a_calltool - SSE streaming with normalized
text,reasoning, andtool_callblocks - Session continuity and session query extensions
- Interrupt lifecycle mapping and callback validation
- Transport selection, Agent Card discovery, timeout control, and bearer/basic auth for outbound A2A calls
- Payload logging controls, secret-handling guardrails, and released-CLI startup / source-based runtime paths
Boundaries
Portable vs Private Surface:
- Treat the core A2A send / stream / task methods plus Agent Card discovery as the portable baseline.
- Treat
codex.*methods plusmetadata.codex.directoryandmetadata.codex.executionas the Codex-specific control plane for Codex-aware clients. - Treat one deployed instance as a single-tenant trust boundary, not a hardened multi-tenant runtime.
The normative compatibility split and deployment model live in Compatibility Guide and Security Policy.
Further Reading
- Usage Guide Runtime configuration, outbound access, transport usage, and client examples.
- Extension Specifications Stable extension URI/spec index plus public-vs-extended card disclosure rules.
- Architecture Guide System structure, boundaries, and request flow.
- Maintainer Architecture Guide Internal module structure, request call chains, and persistence touchpoints for contributors.
- Compatibility Guide Supported Python/runtime surface, extension stability, and ecosystem-facing compatibility expectations.
- Security Policy Threat model, deployment caveats, and vulnerability disclosure guidance.
Development
For contributor workflow, validation, release handling, and helper scripts, see Contributing Guide and Scripts Reference. Use that workflow to create a PR from the working branch and merge into main after human review.
License
Apache License 2.0. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file codex_a2a-0.6.2.tar.gz.
File metadata
- Download URL: codex_a2a-0.6.2.tar.gz
- Upload date:
- Size: 362.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fed986743f0039b78ea42a0098c639f00e5d5700f0e4736e1c158e414931d72e
|
|
| MD5 |
81accd092d29175ef15fd3d78584f019
|
|
| BLAKE2b-256 |
36c1b8ae32fa22d36d5a3456deec054072a6df90419cba0dcaf2e6ea491338a0
|
Provenance
The following attestation bundles were made for codex_a2a-0.6.2.tar.gz:
Publisher:
publish.yml on liujuanjuan1984/codex-a2a
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
codex_a2a-0.6.2.tar.gz -
Subject digest:
fed986743f0039b78ea42a0098c639f00e5d5700f0e4736e1c158e414931d72e - Sigstore transparency entry: 1260199612
- Sigstore integration time:
-
Permalink:
liujuanjuan1984/codex-a2a@bfe66c68c955abbefce9ed9d842830d087a71406 -
Branch / Tag:
refs/tags/v0.6.2 - Owner: https://github.com/liujuanjuan1984
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@bfe66c68c955abbefce9ed9d842830d087a71406 -
Trigger Event:
push
-
Statement type:
File details
Details for the file codex_a2a-0.6.2-py3-none-any.whl.
File metadata
- Download URL: codex_a2a-0.6.2-py3-none-any.whl
- Upload date:
- Size: 191.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3795e22a2fbc52f230ec59cf96f92dfe9f521b19f7560a206d212e1fb0ecbe80
|
|
| MD5 |
42e0220a370af8f46b82a0954d73e50a
|
|
| BLAKE2b-256 |
805833e9bba69cf066aed83da9e4d7d6db8b716cbc2f4be93434e6ffad0093da
|
Provenance
The following attestation bundles were made for codex_a2a-0.6.2-py3-none-any.whl:
Publisher:
publish.yml on liujuanjuan1984/codex-a2a
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
codex_a2a-0.6.2-py3-none-any.whl -
Subject digest:
3795e22a2fbc52f230ec59cf96f92dfe9f521b19f7560a206d212e1fb0ecbe80 - Sigstore transparency entry: 1260199731
- Sigstore integration time:
-
Permalink:
liujuanjuan1984/codex-a2a@bfe66c68c955abbefce9ed9d842830d087a71406 -
Branch / Tag:
refs/tags/v0.6.2 - Owner: https://github.com/liujuanjuan1984
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@bfe66c68c955abbefce9ed9d842830d087a71406 -
Trigger Event:
push
-
Statement type: