Skip to content

Releases: kagenti/adk

v0.8.1

01 Apr 06:34

Choose a tag to compare

🚀 Kagenti ADK version 0.8.1 has been released

This release introduces delta-based streaming for real-time token delivery in the UI, a new CLI admin command, improved local development experience with auto-login, and Helm chart updates with RBAC and MLflow integration.

Major Changes

SDK: Streaming Extensions and Response Accumulator

A new delta-based streaming protocol using JSON Patch (RFC 6902) with a custom str_ins operation enables efficient token-by-token text delivery to the UI. On the server side (adk-py), a MessageAccumulator state machine collects string chunks and generates incremental JSON Patch operations. On the client side (adk-ts), new streaming extension types and Zod schemas are provided. The UI (adk-ui) now applies patches in real-time with batched React state updates for better performance, and fixes a text duplication bug that occurred when the final complete message was appended instead of replacing the streaming draft. The protocol is fully backward compatible — clients that don't negotiate streaming support continue to receive the final complete message as before.

CLI: Admin Console Command

A new kagenti-adk admin command opens the Kagenti admin console GUI directly in the browser. The URL is automatically derived from the active server configuration (localtest.me, localhost, or remote).

UI: Auto-Login for Local Development

Local development environments using localtest.me now automatically log in via OIDC resource owner password grant, matching the CLI's existing behavior and eliminating the manual Keycloak login step during development.

Helm Chart Updates

The kagenti and kagenti-deps charts have been bumped to 0.6.0-alpha.2, bringing RBAC role constants and hierarchy support, AuthBridge configmaps in user namespaces, pinned sidecar image tags (fixing a proxy-init crash), A2A agents deployable with Kagenti UI disabled, configurable domain names (replacing hardcoded localtest.me), and MLflow integration for LLM trace observability.

Bug Fixes

  • Fixed agent self-registration startup issues
  • Fixed Keycloak OIDC issuer URLs and token retrieval in the UI after rebranding
  • Improved auth error messaging on the sign-in page
  • Updated local API URLs after rebranding
  • Removed deprecated settings UI extension

What's Changed

v0.8.1-rc4

31 Mar 10:05

Choose a tag to compare

v0.8.1-rc4 Pre-release
Pre-release
bump: v0.8.1-rc4

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>

v0.8.1-rc3

31 Mar 08:58

Choose a tag to compare

v0.8.1-rc3 Pre-release
Pre-release
fix(ci): correct chart name

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>

v0.8.1-rc2

31 Mar 07:49

Choose a tag to compare

v0.8.1-rc2 Pre-release
Pre-release
fix(ci): simplify release workflow

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>

v0.8.0

30 Mar 10:32

Choose a tag to compare

🚀 Kagenti ADK v0.8.0 — Inaugural Release

Kagenti ADK v0.8.0 is the first stable release of the platform. It provides a Kubernetes-based runtime for building, deploying, and managing A2A-compatible agents, with a CLI, Python and TypeScript SDKs, a web UI, and Helm charts for production deployments.

Platform Overview

Kagenti ADK gives you a full agent hosting environment: a single-node Kubernetes cluster running inside a Lima VM (managed transparently), with Keycloak for authentication, PostgreSQL for persistence, and a Next.js admin UI. Agents communicate over the A2A protocol and can connect to external tools via HTTP-based MCP servers.

Install with one command on Linux or macOS:

sh -c "$(curl -LsSf https://raw.githubusercontent.com/kagenti/adk/main/install.sh)"

What's in This Release

Architectural Shift: Kagenti Operator Replaces Custom Agent Infrastructure

The most significant change from the upstream project is the replacement of the custom Kubernetes agent deployment and build infrastructure with the Kagenti Operator.

Previously, the platform managed its own agent lifecycle: Kubernetes deployments, Kaniko build jobs, scale-to-zero logic, and a DB-stored agent registry with a managed/unmanaged provider distinction. All of that has been removed. The Kagenti Operator now handles agent deployment, discovery, and scaling. ADK focuses on what it's good at — A2A protocol proxying, conversations, user management, auth, and feedback.

Concretely:

  • Agent deployment and scaling → Kagenti Operator
  • Agent discovery → Kagenti API polling + live /.well-known/agent-card.json fetch
  • Keycloak and Phoenix/OTEL → shared from kagenti-deps chart, no longer owned by ADK
  • provider_build and provider_discovery modules removed from both Python and TypeScript SDKs
  • The managed/unmanaged provider distinction is gone — all agents are Kagenti-managed with ONLINE/OFFLINE state
  • 30+ legacy DB migrations collapsed into 3 clean migrations

For developers using the SDK, the removed provider_build and provider_discovery modules are the breaking surface — any code referencing these needs to be removed.

SDK Packages

The Python SDK is published as kagenti-adk on PyPI and the TypeScript SDK as @kagenti/adk on npm. These replace the previous agentstack-sdk package names from the upstream project this fork is based on.

A2A Protocol: SDK v1 with Protobuf Types

The platform ships with support for the official a2a-sdk 1.0.0a0 prerelease. The v1 SDK uses protobuf-based types (Part(text=...), Role.ROLE_AGENT, etc.) rather than the Pydantic models from v0.x. Agents built with the included example skeletons already use the v1 API.

CLI

  • kagenti-adk admin — opens the Kagenti admin console in your browser, automatically resolving the correct URL based on your active server configuration (localtest.me, localhost, or remote)
  • Platform start flow has been simplified and streamlined

UI: Authentication Always On, Zero Friction Locally

Kagenti ADK enforces authentication in all environments — including local development. There is no "auth-disabled" mode. On production and staging, users authenticate via Keycloak as expected.

On local deployments (localtest.me), the UI now auto-logs you in using the default admin/admin credentials — matching the behavior the CLI already had. No manual Keycloak login screen, no copy-pasting credentials. The UI detects the localtest.me issuer via OIDC_PROVIDER_ISSUER and performs the OIDC resource owner password grant transparently.

Additional UI fixes: corrected Keycloak OIDC issuer URLs (/realms/adk path), fixed token retrieval in server-side and API route contexts, and improved auth error messages on the sign-in page.

LLM Configuration via Environment Variables

The LLM extension now falls back to environment variables when no explicit configuration is provided, making it easier to get started without pre-configuring an LLM provider through the admin UI.

Infrastructure and Deployment

  • The local dev VM has been consolidated to a single Lima VM, simplifying the local setup
  • The VM build pipeline is now fully macOS-compatible and adds an Incus build target alongside QEMU, with improved Podman compatibility
  • Helm chart packages are published under kagenti and kagenti-deps

Removed: Managed stdio MCP

Support for stdio-based MCP server deployments (previously via supergateway sidecars) has been removed. Only HTTP-based MCP connectors are supported. The mcp+stdio scheme and associated ConnectorStdioPreset configuration are gone.

Removed: Legacy Settings Extension

The deprecated settings.py CLI extension and settings_agent_legacy.py example have been removed from the Python SDK.

All Merged PRs

v0.8.0-rc6

30 Mar 07:05

Choose a tag to compare

v0.8.0-rc6 Pre-release
Pre-release
fix: use specific env for autologin in UI (#150)

* fix: use specific env for autologin in UI

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

* chore: use existing var

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

---------

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

v0.8.0-rc5

27 Mar 12:05

Choose a tag to compare

v0.8.0-rc5 Pre-release
Pre-release
feat(adk-ui): auto-login for local dev (localtest.me) (#122)

* feat(adk-ui): auto-login for local dev (localtest.me)

Closes #120

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

* docs: note Keycloak default auth and admin/admin creds in quickstart

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

* fix(adk-ui): address PR review comments

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

* refactor(adk-ui): address Petr's PR review comments

- move localDevUserSchema/LocalDevUser to types.ts
- simplify jwt callback
- remove theme param from sign-in handlers and AutoSignIn

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

---------

Signed-off-by: Tomas Weiss <tomas.weiss2@gmail.com>

v0.8.0-rc4

24 Mar 07:13

Choose a tag to compare

v0.8.0-rc4 Pre-release
Pre-release
fix(cli): add entrypoints

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>

v0.8.0-rc3

23 Mar 17:10

Choose a tag to compare

v0.8.0-rc3 Pre-release
Pre-release
fix(ci): helm chart name

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>

v0.8.0-rc2

23 Mar 15:04

Choose a tag to compare

v0.8.0-rc2 Pre-release
Pre-release
fix(ci): skip building agents

Signed-off-by: Jan Pokorný <JenomPokorny@gmail.com>