You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add hierarchical sub-agent support
- Enhanced service.py to handle sub-agent message filtering
- Added langgraph_supervisor_hierarchy_agent.py with 3-layer hierarchy example
- Added comprehensive test for hierarchical agent message flow
- Updated test fixtures for better import handling
This builds on upstream's basic subgraph support (2e6c622) by adding:
- Sophisticated node detection for supervisors and sub-agents
- Proper message handling for handback tools and results
- Support for nested agent hierarchies with proper naming conventions
* Add hierarchical sub-agent UI support
Enhanced Streamlit UI to properly display nested agent hierarchies:
- Different visual indicators for sub-agents (💼) vs tools (🛠️)
- Recursive handling of nested sub-agent transfers
- Proper status container management for multi-level hierarchies
- Support for transfer_back_to handoff messages
- Expanded status containers for better visibility
- Updated tests to match new UI labels
This complements the service layer changes by providing a clear
visual representation of complex agent hierarchies in the UI.
* Add comprehensive UI tests for hierarchical sub-agents
Added test fixtures and test cases to validate:
- Multi-agent message fixtures for reusable test data
- Hierarchical sub-agent UI rendering with proper status containers
- Visual indicators (💼 for sub-agents, 🛠️ for tools)
- Popover functionality for tool calls within sub-agents
- Proper message flow through transfer_to/transfer_back_to patterns
These tests ensure the UI correctly displays complex agent hierarchies
with proper visual organization and user experience.
* Add comprehensive hierarchical sub-agent UI test suite
Added three critical test patterns for hierarchical sub-agents:
1. test_app_streaming_single_sub_agent:
- Tests single sub-agent with multiple tool calls
- Validates popover functionality for tools within sub-agents
- Ensures proper status container organization
2. test_app_streaming_sequential_sub_agents:
- Tests supervisor -> agent A -> supervisor -> agent C -> supervisor flow
- Validates sequential agent handoffs with proper UI separation
- Ensures multiple status containers are handled correctly
3. test_app_streaming_nested_sub_agents:
- Tests true nesting: supervisor -> agent A -> agent B -> agent A -> supervisor
- Validates recursive status container nesting
- Ensures proper visual hierarchy for deeply nested agents
These tests provide comprehensive coverage of all hierarchical patterns
and ensure the UI correctly handles complex multi-agent workflows.
* Remove unnecessary test
* Unneeded extra check
* Update streamlit version + agent desc
* remove unneeded hardcoded behaviour
* Revert unneeded change
* Run precommit
Copy file name to clipboardExpand all lines: docs/File_Based_Credentials.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# File Based Crendentials
1
+
# File Based Crendentials
2
2
3
3
As you develop your agents, you might discover that you have credentials that you need to store on disk that you don't want stored in your Git Repo or baked into your container image.
4
4
@@ -7,13 +7,13 @@ Examples:
7
7
- Certificates or private keys needed for communication with external APIs
8
8
9
9
10
-
The `privatecredentials/` folder give you a quick place to put these files in development.
10
+
The `privatecredentials/` folder give you a quick place to put these files in development.
11
11
12
12
13
13
## How it works
14
14
15
15
*Protection*
16
-
- The .dockerignore file excludes the entire folder to keep it out of the build process.
16
+
- The .dockerignore file excludes the entire folder to keep it out of the build process.
17
17
- The .gitignore files only allows the `.gitkeep` file -- since git doesn't track empty folders.
18
18
19
19
@@ -34,7 +34,7 @@ The syncing feature of Docker Watch isn't used for these reasons:
34
34
35
35
For each file based credential, do the following:
36
36
1. Put the file (e.g. `example-creds.txt`) into the `privatecredentials/` folder
37
-
2. In your `.env` file, create an environment variable for the credential (e.g `EXAMPLE_CREDENTIAL=/privatecredentials/example-creds.txt`) that your agent will use to reference the location at runtime
37
+
2. In your `.env` file, create an environment variable for the credential (e.g `EXAMPLE_CREDENTIAL=/privatecredentials/example-creds.txt`) that your agent will use to reference the location at runtime
38
38
3. In your agent, use the environment variable wherever you need the path to the credential
39
39
40
40
@@ -72,5 +72,3 @@ There are a number of approaches:
72
72
- Use the secrets management feature of your cloud hosting environment (Google Cloud Secrets, AWS Secrets Manager, etc)
73
73
- Use a 3rd party secrets management platform
74
74
- Manually place the credentials on your Docker hosts and mount volumes to map the credentials to the container (Less secure)
0 commit comments