Skip to main content

A high-performance TCP bridge and async client for OpenClaw ACP. Make your OpenClaw Agent an ACP server on TCP! Call OpenClaw in your python projects with ease!

Project description

OpenClaw ACP Bridge

A high-performance TCP bridge and async client for OpenClaw ACP. Make your OpenClaw Agent an ACP server on TCP! Call OpenClaw in your python projects with ease!

The OpenClaw ACP Bridge solves the challenge of maintaining persistent agent sessions over standard TCP while providing a high-speed "side-channel" for large-scale file transfers. It is designed for high-performance agentic workflows where large binary assets (images, videos, datasets) need to be moved efficiently between remote agents and local clients.

🚀 Key Features

  • Persistent Agent Session: Unlike standard ACP tools that may restart agents per request, the bridge maintains a single persistent agent process across multiple client turns.
  • Real-time Response Streaming: Stream agent responses token-by-token (chunk-by-chunk) for an interactive, low-latency UI experience.
  • High-Speed HTTP Side-Channel: Automatically switches to HTTP streaming for large files (GB-sized), bypassing JSON-RPC/Base64 overhead and memory bloat.
  • Explicit File Interception: Use /filerequest <path> to instantly fetch any file from the remote agent's filesystem.
  • Improved Auto-File Retrieval: Intelligently detects [FILEPATH: /path/to/file] and file:///path/to/file patterns in agent responses and automatically initiates a high-speed transfer.
  • Zero-Wait Synchronization: New v0.5.0 client ensures all background image downloads are fully synchronized before yielding final responses, eliminating race conditions in high-concurrency environments.
  • Async/Non-Blocking: Built from the ground up for asyncio, utilizing httpx for reliable binary streaming.
  • Environment Consistency: Server-side agent launching utilizes interactive shells (bash -i) to ensure .bashrc, NVM, and local paths are correctly resolved.

📦 Installation

On the server (host where your openclaw gateway runs on) side, as the acp_server_bridge. And the client side if you want to run with our client interface. Or you can use acp directly to connect to the acp_server_bridge using TCP directly (pip install agent-client-protocol).

pip install openclaw-acp-bridge

🛠️ Usage

1. Launch the Bridge Server

On your remote server (where OpenClaw is installed), start the bridge using the provided helper script:

chmod +x run_acp_server.sh
./run_acp_server.sh

Or run the module directly:

python -m openclaw_acp_bridge --host 0.0.0.0 --port 18781 --debug

Note: The bridge will also open a side-channel HTTP server on port + 1 (default 18782).

2. Connect the Async Client

On your local machine, use the OpenClaw client to interact with the remote agent:

import asyncio
from openclaw_acp_bridge import OpenClaw

async def main():
    # Connect to the remote bridge
    async with OpenClaw(host="10.71.253.132", download_dir="my_assets") as client:
        # 1. Standard Chat
        response = await client.chat("Hello, who are you?")
        print(f"Agent: {response.text}")

        # 2. Real-time Streaming
        async for chunk in client.chat_stream("Explain quantum physics simply."):
            if isinstance(chunk, str):
                print(chunk, end="", flush=True)
            else:
                # Final response object containing full text and file paths
                print(f"\nFinal response has {len(chunk.files)} files.")

        # 3. Explicit File Request

        # 3. Auto-Retrieval Pattern
        # Ask the agent to generate something and return the path
        response = await client.chat("Generate a report and return path in [FILEPATH: /path] format.")
        # The client automatically detects the pattern and fetches the file!
        for file in response.files:
            print(f"Auto-downloaded: {file}")

if __name__ == "__main__":
    asyncio.run(main())

🔌 Using with Standard ACP Clients

The bridge is fully compatible with any standard ACP-compliant client or SDK. To use it, simply point your client to the bridge's TCP address (default port 18781).

Why use the Bridge with standard clients?

  1. Persistence: Even with a standard client, the bridge keeps your remote agent process alive across sessions.
  2. Environment: The bridge handles the complex bash -i shell environment setup for you.
  3. Special Commands: You can still use /filerequest <path> in your prompts. The bridge will intercept these and return a standard ACP resource block.

Note: When using a standard client, the high-speed HTTP side-channel will return a resource block with a uri starting with http://. Ensure your client can handle HTTP-based resources or use our provided openclaw_acp_bridge client for automatic handling.

⚙️ Advanced Configuration

Bridge Server Options

You can customize the server behavior using CLI arguments:

python -m openclaw_acp_bridge --port 18781 --token "my-secret-key" --openclaw-path "/usr/local/bin/openclaw"
Parameter Description
--host Host to bind the TCP server to (default: 0.0.0.0)
--port Port to listen on (default: 18781)
--token Optional authentication token. If set, clients must provide this token to connect.
--openclaw-path Path to the openclaw binary on the server (default: openclaw)
--no-http Disable the high-speed HTTP side-channel. When set, the bridge uses standard Base64 blobs for all file transfers.
--debug Enable verbose logging for debugging.

Authentication

The bridge supports simple token-based authentication. You can either pass the token via the --token CLI argument or place a token.txt file in the server's working directory. The --token argument takes precedence.

Download Directory

The client allows you to specify where downloaded assets should be stored:

client = OpenClaw(host="...", download_dir="./downloads")

🧪 Testing

The package includes a comprehensive test suite test_bridge.py that demonstrates chat, small file blobs, and large-scale (100MB+) HTTP streaming.

python test_bridge.py --tests 1,2,3,4

🔄 Version 0.6.0 Updates

  • Isolated Agent Targeting (--agent <agent_name>): Start the bridge with a specific agent name using the --agent parameter in the launcher. The bridge handles agent routing and isolated workspace initialization automatically.
  • Spawned ACP Session Keys: Spawns isolated session keys in the format agent:<agent_name>:<session_id> (e.g. agent:agentchatter:acp) instead of overriding the default main (agent:main:main) session. This enables multiple bridges and agents to run concurrently without session overlap.
  • Self-Healing Conflict Resolution: Automatically stops and resolves stale openclaw-acp, run_acp_server.py, or openclaw_acp_bridge daemon instances on server boot/restart to guarantee a fresh ACP TCP listener.
  • Standardized systemd Service Template (openclaw-acp-bridge.service):
    • Implements complete environment variables configuration (PATH, HOME, TMPDIR) to cleanly load NVM/Node paths.
    • Implements optimized PID replacement (exec substitution) so systemd tracks the Python server directly as the Main PID instead of a bash wrapper script.
    • Uses robust KillMode=control-group process management to prevent zombie or orphaned subprocesses.

� Version 0.6.1 Updates

  • Multimodal chat_stream Support: chat_stream() now accepts an optional image_data (base64-encoded bytes) and image_mime parameter, allowing image+text prompts to be sent to the agent in a single streaming call. Enables i2i (image-to-image) and vision-based agentic workflows without a separate API.
  • Proactive Dead-Process Detection on Connect: The server now immediately checks whether the backing OpenClaw process is alive the moment a new client authenticates and connects, triggering an automatic restart_openclaw_process() before the first message is forwarded — preventing silent failures on stale sessions.
  • Debug Log Truncation: Agent↔Client log lines in --debug mode are now capped at 500 characters with a ... (truncated) suffix, preventing log flooding when large base64 payloads (e.g. images) are exchanged.
  • Increased TCP Read Buffer: asyncio.start_server is now launched with limit=16*1024*1024 (16 MB), supporting large prompt payloads such as base64-encoded images that exceed the previous default 64 KB stream buffer.

�📜 License

BSD 3-Clause

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

openclaw_acp_bridge-0.6.1.tar.gz (18.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

openclaw_acp_bridge-0.6.1-py3-none-any.whl (16.1 kB view details)

Uploaded Python 3

File details

Details for the file openclaw_acp_bridge-0.6.1.tar.gz.

File metadata

  • Download URL: openclaw_acp_bridge-0.6.1.tar.gz
  • Upload date:
  • Size: 18.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.11

File hashes

Hashes for openclaw_acp_bridge-0.6.1.tar.gz
Algorithm Hash digest
SHA256 65bc67b57b9734f48f6224b35195279c0450cd673cb4fcbcefb59da0baf3b905
MD5 37b28c3c0c7b75742857be1fdf1c8ab5
BLAKE2b-256 4bd2fe8f51fd96246447928c1790129e3262fb95a0688317ed0ae164d0fe1ab7

See more details on using hashes here.

File details

Details for the file openclaw_acp_bridge-0.6.1-py3-none-any.whl.

File metadata

File hashes

Hashes for openclaw_acp_bridge-0.6.1-py3-none-any.whl
Algorithm Hash digest
SHA256 9d0bf2e093002e2e2dd2bebbad32f5a0854e96673e4a67d9757301a53cf75e93
MD5 fde4e3f315e748922d965ed5d8853f53
BLAKE2b-256 b4f9b89551dc58a8ba0a3f4958949e9ca22f4c51dcd4c4dd4172a24d610f8c20

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page