Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
e73deae to
4e0266a
Compare
8e39e44 to
f9a704b
Compare
This TEP proposes making Tekton an agent-native workflow engine by integrating with kagent for agent runtime capabilities and adding orchestration, security, and provenance layers. Introduces AgentRun and AgentConfig CRDs under agent.tekton.dev that: - Delegate agent execution to kagent (LLM, MCP tools, agent loop) - Use Tekton Pipelines for pre/post hooks - Add per-run RBAC, NetworkPolicy, OPA policy enforcement - Record provenance for Tekton Chains consumption Co-Authored-By: Anitha Priya Natarajan <anithapriyanatarajan@users.noreply.github.com> Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
f9a704b to
2867baf
Compare
|
[Anitha] We need to set some boundaries for the agents. If it works for too long there needs to be manual way for human intervention. A workflow that would be good for QE would be to generate good test cases. SLSA is something we can actively participate in for this. Streaming logs for streaming the logs from Claude. We need to orchestrate the agents in a controlled way or a Kubernetes native way. |
Summary
This TEP proposes making Tekton an agent-native workflow engine by introducing
AgentRunandAgentConfigCRDs that orchestrate AI agent execution with security and provenance controls.Rather than rebuilding the agent stack inside Tekton, this TEP takes a composition-first approach:
/kind tep
Motivation
AI agents are already appearing in CI/CD pipelines as opaque Python scripts inside container steps. A real-world comparison of a Jira-driven test lifecycle pipeline with and without agents shows:
But Tekton cannot see inside these agent steps — no visibility into models, tools, tokens, or policy compliance.
Meanwhile, kagent already solves the agent runtime problem with CRDs for model configuration, MCP tool servers, agent deployment, and memory. But kagent doesn't provide pipeline orchestration, supply-chain provenance, or per-execution security controls.
This TEP bridges the gap: Tekton orchestrates when/how agents run. kagent handles what agents do. AgentRun adds the security and trust layer.
Key Design Decisions
k8s.io/client-go/dynamic— no Go module dependency, no version couplingPoC
Working proof-of-concept at waveywaves/tekton-agentrun — successfully runs end-to-end in a Kind cluster with mock agent provider.
Related
/cc @anithapriyanatarajan