Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

docs(adk): PolishREADME with comprehensive examples#464

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
anubhav756 wants to merge10 commits intofeat/credential-factories
base:feat/credential-factories
Choose a base branch
Loading
fromdocs/toolbox-adk-readme

Conversation

@anubhav756
Copy link
Contributor

@anubhav756anubhav756 commentedDec 12, 2025
edited
Loading

UpdatesREADME with complete documentation.

  • Installation & Setup.
  • Detailed examples for all Authentication Strategies (Workload Identity, 3LO, Manual).
  • Header injection, Hooks, Bound Params, Auth token getters

@anubhav756anubhav756 requested a review froma team as acode ownerDecember 12, 2025 16:06
@anubhav756anubhav756force-pushed thefeat/credential-factories branch from3516e5e to295a3c1CompareDecember 12, 2025 16:19
@anubhav756anubhav756force-pushed thefeat/credential-factories branch from295a3c1 to8cabc61CompareDecember 12, 2025 16:32
@anubhav756anubhav756force-pushed thedocs/toolbox-adk-readme branch 8 times, most recently from055d710 tofe0d3d7CompareDecember 12, 2025 18:10
@anubhav756anubhav756force-pushed thefeat/credential-factories branch 2 times, most recently fromf5c316b tode38a50CompareDecember 12, 2025 18:15
@anubhav756anubhav756force-pushed thefeat/credential-factories branch fromde38a50 to532a7c7CompareDecember 12, 2025 18:20
@anubhav756anubhav756force-pushed thedocs/toolbox-adk-readme branch 2 times, most recently from51e6f74 tof0f7b28CompareDecember 12, 2025 18:46
Implements the ToolboxToolset class in toolbox-adk.- Wraps ToolboxClient to provide tools to ADK agents.- Supports all standard credential strategies.- Adds support for auth_token_getters to handle tools with custom authSources (runtime token resolution).- Includes unit tests for toolset functionality.
Adds a comprehensive integration test suite for toolbox-adk matching toolbox-core coverage.- Basic E2E: Loading toolsets, running tools.- Parameters: Bound parameters, Map parameters, Optional parameters.- Authentication: Verifies auth_token_getters propagation and error handling.- Input Validation: Verifies correct error types for missing/invalid inputs.
Adds factory methods to CredentialStrategy to easily create configurations from ADK objects.- from_adk_auth_config(auth_config)- from_adk_credentials(scheme, credential)ENSURES strict consistency between ADK auth types and Toolbox credential requirements.
@anubhav756anubhav756force-pushed thefeat/credential-factories branch from532a7c7 to7355c10CompareDecember 12, 2025 19:19
This package allows Google ADK agents to natively use tools from the MCP Toolbox.
This package allows Google ADK (Agent Development Kit) agents to natively use tools from the[MCP Toolbox](https://github.com/googleapis/genai-toolbox).

It provides a seamless bridge between the`toolbox-core` SDK and the ADK's`BaseTool` /`BaseToolset` interfaces, handling authentication propagation, header management, and tool wrapping automatically.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

nit: I like when we have the TOC


##Authentication Strategies

The`toolbox-adk` package provides flexible authentication strategies to handle`Client-to-Server` authentication (securing the connection to the Toolbox server) and`User Identity` propagation (authenticating the user for specific tools).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

nit: don't use backticks around client to server and user identity

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Bold or italics would be nice

Uses the agent's environment credentials (ADC) to generate an OIDC ID token. This is the standard way for one service to authenticate to another on Google Cloud.

```python
# target_audience should match the URL of your Toolbox server
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

nit: add imports to these code snippets too


###Workload Identity (Recommended for Cloud Run / GKE)

Uses the agent's environment credentials (ADC) to generate an OIDC ID token. This is the standard way for one service to authenticate to another on Google Cloud.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Suggested change
Uses the agent's environment credentials (ADC) to generate an OIDCIDtoken. This is the standard way for one service to authenticate to another on Google Cloud.
Uses the agent's environment credentials (ADC) to generate an OIDC token. This is the standard way for one service to authenticate to another on Google Cloud.

Propagates the end-user's identity to the Toolbox. This is used when the tools themselves need to act on behalf of the user (e.g., accessing the user's Drive or Calendar).

```python
creds= CredentialStrategy.user_identity(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Is this passed in to the ToolboxToolset the same as above? I worry about confusing the service to service with end user auth concepts

)
```

###Global Parameter Binding
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

nit: in the future we should show examples of using the binding

Co-authored-by: Averi Kitsch <akitsch@google.com>
@anubhav756anubhav756 changed the titledocs(toolbox-adk): Polished README with comprehensive examplesdocs(adk): Polished README with comprehensive examplesDec 19, 2025
@anubhav756anubhav756 changed the titledocs(adk): Polished README with comprehensive examplesdocs(adk): Polish README with comprehensive examplesDec 19, 2025
@anubhav756anubhav756 changed the titledocs(adk): Polish README with comprehensive examplesdocs(adk): PolishREADME with comprehensive examplesDec 19, 2025
@anubhav756anubhav756force-pushed thefeat/credential-factories branch 22 times, most recently from8959c86 toeb3184bCompareDecember 19, 2025 16:30
@anubhav756anubhav756force-pushed thefeat/credential-factories branch fromeb3184b toe3b4dabCompareDecember 19, 2025 16:35
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@averikitschaverikitschaverikitsch approved these changes

@kurtisvgkurtisvgAwaiting requested review from kurtisvg

Assignees

@anubhav756anubhav756

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@anubhav756@averikitsch@twishabansal

[8]ページ先頭

©2009-2025 Movatter.jp