core-agent-ide/codex-rs
Josh McKinney 6912da84a8
client: extend custom CA handling across HTTPS and websocket clients (#14239)
## Stacked PRs

This work is now effectively split across two steps:

- #14178: add custom CA support for browser and device-code login flows,
docs, and hermetic subprocess tests
- #14239: extend that shared custom CA handling across Codex HTTPS
clients and secure websocket TLS

Note: #14240 was merged into this branch while it was stacked on top of
this PR. This PR now subsumes that websocket follow-up and should be
treated as the combined change.

Builds on top of #14178.

## Problem

Custom CA support landed first in the login path, but the real
requirement is broader. Codex constructs outbound TLS clients in
multiple places, and both HTTPS and secure websocket paths can fail
behind enterprise TLS interception if they do not honor
`CODEX_CA_CERTIFICATE` or `SSL_CERT_FILE` consistently.

This PR broadens the shared custom-CA logic beyond login and applies the
same policy to websocket TLS, so the enterprise-proxy story is no longer
split between “HTTPS works” and “websockets still fail”.

## What This Delivers

Custom CA support is no longer limited to login. Codex outbound HTTPS
clients and secure websocket connections can now honor the same
`CODEX_CA_CERTIFICATE` / `SSL_CERT_FILE` configuration, so enterprise
proxy/intercept setups work more consistently end-to-end.

For users and operators, nothing new needs to be configured beyond the
same CA env vars introduced in #14178. The change is that more of Codex
now respects them, including websocket-backed flows that were previously
still using default trust roots.

I also manually validated the proxy path locally with mitmproxy using:
`CODEX_CA_CERTIFICATE=~/.mitmproxy/mitmproxy-ca-cert.pem
HTTPS_PROXY=http://127.0.0.1:8080 just codex`
with mitmproxy installed via `brew install mitmproxy` and configured as
the macOS system proxy.

## Mental model

`codex-client` is now the owner of shared custom-CA policy for outbound
TLS client construction. Reqwest callers start from the builder
configuration they already need, then pass that builder through
`build_reqwest_client_with_custom_ca(...)`. Websocket callers ask the
same module for a rustls client config when a custom CA bundle is
configured.

The env precedence is the same everywhere:
- `CODEX_CA_CERTIFICATE` wins
- otherwise fall back to `SSL_CERT_FILE`
- otherwise use system roots

The helper is intentionally narrow. It loads every usable certificate
from the configured PEM bundle into the appropriate root store and
returns either a configured transport or a typed error that explains
what went wrong.

## Non-goals

This does not add handshake-level integration tests against a live TLS
endpoint. It does not validate that the configured bundle forms a
meaningful certificate chain. It also does not try to force every
transport in the repo through one abstraction; it extends the shared CA
policy across the reqwest and websocket paths that actually needed it.

## Tradeoffs

The main tradeoff is centralizing CA behavior in `codex-client` while
still leaving adoption up to call sites. That keeps the implementation
additive and reviewable, but it means the rule "outbound Codex TLS that
should honor enterprise roots must use the shared helper" is still
partly enforced socially rather than by types.

For websockets, the shared helper only builds an explicit rustls config
when a custom CA bundle is configured. When no override env var is set,
websocket callers still use their ordinary default connector path.

## Architecture

`codex-client::custom_ca` now owns CA bundle selection, PEM
normalization, mixed-section parsing, certificate extraction, typed
CA-loading errors, and optional rustls client-config construction for
websocket TLS.

The affected consumers now call into that shared helper directly rather
than carrying login-local CA behavior:
- backend-client
- cloud-tasks
- RMCP client paths that use `reqwest`
- TUI voice HTTP paths
- `codex-core` default reqwest client construction
- `codex-api` websocket clients for both responses and realtime
websocket connections

The subprocess CA probe, env-sensitive integration tests, and shared PEM
fixtures also live in `codex-client`, which is now the actual owner of
the behavior they exercise.

## Observability

The shared CA path logs:
- which environment variable selected the bundle
- which path was loaded
- how many certificates were accepted
- when `TRUSTED CERTIFICATE` labels were normalized
- when CRLs were ignored
- where client construction failed

Returned errors remain user-facing and include the relevant env var,
path, and remediation hint. That same error model now applies whether
the failure surfaced while building a reqwest client or websocket TLS
configuration.

## Tests

Pure unit tests in `codex-client` cover env precedence and PEM
normalization behavior. Real client construction remains in subprocess
tests so the suite can control process env and avoid the macOS seatbelt
panic path that motivated the hermetic test split.

The subprocess coverage verifies:
- `CODEX_CA_CERTIFICATE` precedence over `SSL_CERT_FILE`
- fallback to `SSL_CERT_FILE`
- single-cert and multi-cert bundles
- malformed and empty-file errors
- OpenSSL `TRUSTED CERTIFICATE` handling
- CRL tolerance for well-formed CRL sections

The websocket side is covered by the existing `codex-api` / `codex-core`
websocket test suites plus the manual mitmproxy validation above.

---------

Co-authored-by: Ivan Zakharchanka <3axap4eHko@gmail.com>
Co-authored-by: Codex <noreply@openai.com>
2026-03-13 00:59:26 +00:00
..
.cargo Fix release build take (#12865) 2026-02-25 20:59:07 -08:00
.config Stabilize protocol schema fixture generation (#13886) 2026-03-09 13:51:50 -07:00
.github/workflows chore(ci): add cargo audit workflow and policy (#7108) 2025-11-24 12:20:55 -08:00
ansi-escape feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
app-server feat: add plugin/read. (#14445) 2026-03-12 16:52:21 -07:00
app-server-client fix(bazel) add missing app-server-client BUILD.bazel (#14027) 2026-03-09 03:42:54 +00:00
app-server-protocol feat: add plugin/read. (#14445) 2026-03-12 16:52:21 -07:00
app-server-test-client chore(app-server): stop emitting codex/event/ notifications (#14392) 2026-03-12 00:45:20 +00:00
apply-patch fix: codex-arg0 no longer depends on codex-core (#12434) 2026-02-21 00:20:42 -08:00
arg0 feat: pass helper executable paths via Arg0DispatchPaths (#12719) 2026-02-24 17:44:38 -08:00
artifacts chore: ultra-clean artifacts (#13577) 2026-03-05 13:03:01 +00:00
async-utils feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
backend-client client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
chatgpt feat: add plugin/read. (#14445) 2026-03-12 16:52:21 -07:00
cli use scopes_supported for OAuth when present on MCP servers (#14419) 2026-03-12 11:57:06 -07:00
cloud-requirements Add granular metrics for cloud requirements load (#14108) 2026-03-11 12:33:08 -07:00
cloud-tasks client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
cloud-tasks-client add codex cloud list (#9324) 2026-01-16 08:56:38 -08:00
codex-api client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
codex-backend-openapi-models feat: support multiple rate limits (#11260) 2026-02-10 20:09:31 -08:00
codex-client client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
codex-experimental-api-macros app-server: propagate nested experimental gating for AskForApproval::Reject (#14191) 2026-03-11 12:33:08 -07:00
config fix: support managed network allowlist controls (#12752) 2026-03-06 17:52:54 -08:00
connectors [apps] Add tool_suggest tool. (#14287) 2026-03-11 22:06:59 -07:00
core client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
debug-client feat: add search term to thread list (#12578) 2026-02-25 09:59:41 +00:00
docs chore(app-server): delete v1 RPC methods and notifications (#13375) 2026-03-03 13:18:25 -08:00
exec Fix codex exec --profile handling (#14524) 2026-03-12 17:34:25 -06:00
execpolicy execpolicy: add host_executable() path mappings (#12964) 2026-02-27 12:59:24 -08:00
execpolicy-legacy feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
feedback Add timestamps to feedback log lines (#13688) 2026-03-06 07:34:59 -07:00
file-search fix(core): scope file search gitignore to repository context (#13250) 2026-03-02 21:52:20 -07:00
hooks start of hooks engine (#13276) 2026-03-10 04:11:31 +00:00
keyring-store feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
linux-sandbox fix: preserve split filesystem semantics in linux sandbox (#14173) 2026-03-12 10:56:32 -07:00
lmstudio chore(deps): bump tracing from 0.1.43 to 0.1.44 in /codex-rs (#9880) 2026-01-26 15:48:45 -08:00
login client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
mcp-server feat: support disabling bundled system skills (#13792) 2026-03-09 22:02:53 -07:00
network-proxy fix(network-proxy): serve HTTP proxy listener as HTTP/1 (#14395) 2026-03-11 14:35:44 -07:00
ollama chore: nuke chat/completions API (#10157) 2026-02-03 11:31:57 +00:00
otel feat: search_tool migrate to bring you own tool of Responses API (#14274) 2026-03-11 17:51:51 -07:00
package-manager chore: ultra-clean artifacts (#13577) 2026-03-05 13:03:01 +00:00
process-hardening feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
protocol Rename reject approval policy to granular (#14516) 2026-03-12 16:38:04 -07:00
responses-api-proxy Update pnpm versions to fix cve-2026-24842 (#12009) 2026-02-19 14:27:55 -08:00
rmcp-client client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
scripts Upgrade to rust 1.93 (#10080) 2026-01-28 17:46:18 +00:00
secrets Move sanitizer into codex-secrets (#12306) 2026-02-20 22:47:54 +00:00
shell-command Collapse parsed command summaries when any stage is unknown (#13043) 2026-03-03 19:45:34 +00:00
shell-escalation start of hooks engine (#13276) 2026-03-10 04:11:31 +00:00
skills Add OpenAI Docs skill (#13596) 2026-03-11 12:33:08 -07:00
state feat: simplify DB further (#13771) 2026-03-07 03:48:36 -08:00
stdio-to-uds Fix stdio-to-uds peer-close flake (#13882) 2026-03-12 09:52:50 -07:00
test-macros feat: add large stack test macro (#12768) 2026-02-25 13:19:21 +00:00
tui client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
utils refactor: make bubblewrap the default Linux sandbox (#13996) 2026-03-11 23:31:18 -07:00
vendor build(linux-sandbox): always compile vendored bubblewrap on Linux; remove CODEX_BWRAP_ENABLE_FFI (#11498) 2026-02-11 21:30:41 -08:00
windows-sandbox-rs copy current exe to CODEX_HOME/.sandbox-bin for apply_patch (#13669) 2026-03-05 22:15:10 -08:00
.gitignore [MCP] Prefix MCP tools names with mcp__ (#5309) 2025-10-19 20:41:55 -04:00
BUILD.bazel Add feature-gated freeform js_repl core runtime (#10674) 2026-02-11 12:05:02 -08:00
Cargo.lock client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
Cargo.toml client: extend custom CA handling across HTTPS and websocket clients (#14239) 2026-03-13 00:59:26 +00:00
clippy.toml fix: switch rate limit reset handling to timestamps (#5304) 2025-10-17 17:39:37 -07:00
config.md Fix link to MCP Servers config section (#5301) 2025-10-17 14:58:27 -07:00
default.nix fix(nix): include libcap dependency on linux builds (#12415) 2026-02-20 19:32:15 -08:00
deny.toml feat: external artifacts builder (#13485) 2026-03-04 20:22:34 +00:00
node-version.txt Reduce js_repl Node version requirement to 22.22.0 (#12857) 2026-02-26 04:09:30 +00:00
README.md feat: memories in workspace write (#13467) 2026-03-04 13:00:26 +00:00
rust-toolchain.toml Revert "chore(deps): bump rust-toolchain from 1.93.0 to 1.93.1 in /co…dex-rs (#11886)" (#12035) 2026-02-17 12:29:03 -08:00
rustfmt.toml Update cargo to 2024 edition (#842) 2025-05-07 08:37:48 -07:00

Codex CLI (Rust Implementation)

We provide Codex CLI as a standalone, native executable to ensure a zero-dependency install.

Installing Codex

Today, the easiest way to install Codex is via npm:

npm i -g @openai/codex
codex

You can also install via Homebrew (brew install --cask codex) or download a platform-specific release directly from our GitHub Releases.

Documentation quickstart

What's new in the Rust CLI

The Rust implementation is now the maintained Codex CLI and serves as the default experience. It includes a number of features that the legacy TypeScript CLI never supported.

Config

Codex supports a rich set of configuration options. Note that the Rust CLI uses config.toml instead of config.json. See docs/config.md for details.

Model Context Protocol Support

MCP client

Codex CLI functions as an MCP client that allows the Codex CLI and IDE extension to connect to MCP servers on startup. See the configuration documentation for details.

MCP server (experimental)

Codex can be launched as an MCP server by running codex mcp-server. This allows other MCP clients to use Codex as a tool for another agent.

Use the @modelcontextprotocol/inspector to try it out:

npx @modelcontextprotocol/inspector codex mcp-server

Use codex mcp to add/list/get/remove MCP server launchers defined in config.toml, and codex mcp-server to run the MCP server directly.

Notifications

You can enable notifications by configuring a script that is run whenever the agent finishes a turn. The notify documentation includes a detailed example that explains how to get desktop notifications via terminal-notifier on macOS. When Codex detects that it is running under WSL 2 inside Windows Terminal (WT_SESSION is set), the TUI automatically falls back to native Windows toast notifications so approval prompts and completed turns surface even though Windows Terminal does not implement OSC 9.

codex exec to run Codex programmatically/non-interactively

To run Codex non-interactively, run codex exec PROMPT (you can also pass the prompt via stdin) and Codex will work on your task until it decides that it is done and exits. Output is printed to the terminal directly. You can set the RUST_LOG environment variable to see more about what's going on. Use codex exec --ephemeral ... to run without persisting session rollout files to disk.

Experimenting with the Codex Sandbox

To test to see what happens when a command is run under the sandbox provided by Codex, we provide the following subcommands in Codex CLI:

# macOS
codex sandbox macos [--full-auto] [--log-denials] [COMMAND]...

# Linux
codex sandbox linux [--full-auto] [COMMAND]...

# Windows
codex sandbox windows [--full-auto] [COMMAND]...

# Legacy aliases
codex debug seatbelt [--full-auto] [--log-denials] [COMMAND]...
codex debug landlock [--full-auto] [COMMAND]...

Selecting a sandbox policy via --sandbox

The Rust CLI exposes a dedicated --sandbox (-s) flag that lets you pick the sandbox policy without having to reach for the generic -c/--config option:

# Run Codex with the default, read-only sandbox
codex --sandbox read-only

# Allow the agent to write within the current workspace while still blocking network access
codex --sandbox workspace-write

# Danger! Disable sandboxing entirely (only do this if you are already running in a container or other isolated env)
codex --sandbox danger-full-access

The same setting can be persisted in ~/.codex/config.toml via the top-level sandbox_mode = "MODE" key, e.g. sandbox_mode = "workspace-write". In workspace-write, Codex also includes ~/.codex/memories in its writable roots so memory maintenance does not require an extra approval.

Code Organization

This folder is the root of a Cargo workspace. It contains quite a bit of experimental code, but here are the key crates:

  • core/ contains the business logic for Codex. Ultimately, we hope this to be a library crate that is generally useful for building other Rust/native applications that use Codex.
  • exec/ "headless" CLI for use in automation.
  • tui/ CLI that launches a fullscreen TUI built with Ratatui.
  • cli/ CLI multitool that provides the aforementioned CLIs via subcommands.

If you want to contribute or inspect behavior in detail, start by reading the module-level README.md files under each crate and run the project workspace from the top-level codex-rs directory so shared config, features, and build scripts stay aligned.