langchain/libs/partners/azure-dynamic-sessions
2024-08-13 16:10:00 -07:00
..
langchain_azure_dynamic_sessions [docs]: standardize tool docstrings (#25351) 2024-08-13 16:10:00 -07:00
scripts patch[Partners] Unified fix of incorrect variable declarations in all check_imports (#25014) 2024-08-03 13:49:41 -04:00
tests infra: update mypy 1.10, ruff 0.5 (#23721) 2024-07-03 10:33:27 -07:00
.gitignore azure-dynamic-sessions: add Python REPL tool (#21264) 2024-05-09 21:39:04 +00:00
LICENSE azure-dynamic-sessions: add Python REPL tool (#21264) 2024-05-09 21:39:04 +00:00
Makefile infra: update mypy 1.10, ruff 0.5 (#23721) 2024-07-03 10:33:27 -07:00
poetry.lock infra: update mypy 1.10, ruff 0.5 (#23721) 2024-07-03 10:33:27 -07:00
pyproject.toml all: add release notes to pypi (#24519) 2024-07-22 13:59:13 -07:00
README.md azure-dynamic-sessions: add Python REPL tool (#21264) 2024-05-09 21:39:04 +00:00

langchain-azure-dynamic-sessions

This package contains the LangChain integration for Azure Container Apps dynamic sessions. You can use it to add a secure and scalable code interpreter to your agents.

Installation

pip install -U langchain-azure-dynamic-sessions

Usage

You first need to create an Azure Container Apps session pool and obtain its management endpoint. Then you can use the SessionsPythonREPLTool tool to give your agent the ability to execute Python code.

from langchain_azure_dynamic_sessions import SessionsPythonREPLTool


# get the management endpoint from the session pool in the Azure portal
tool = SessionsPythonREPLTool(pool_management_endpoint=POOL_MANAGEMENT_ENDPOINT)

prompt = hub.pull("hwchase17/react")
tools=[tool]
react_agent = create_react_agent(
    llm=llm,
    tools=tools,
    prompt=prompt,
)

react_agent_executor = AgentExecutor(agent=react_agent, tools=tools, verbose=True, handle_parsing_errors=True)

react_agent_executor.invoke({"input": "What is the current time in Vancouver, Canada?"})

By default, the tool uses DefaultAzureCredential to authenticate with Azure. If you're using a user-assigned managed identity, you must set the AZURE_CLIENT_ID environment variable to the ID of the managed identity.