Skip to main content

Synchronous, blocking approval system for PydanticAI agent tools

Project description

pydantic-ai-blocking-approval

Synchronous, blocking approval system for PydanticAI agent tools.

Status: This package is experimental. The core wrapper (ApprovalToolset, ApprovalController) is more mature, while pattern-based approval via needs_approval() is highly experimental and likely to change. See design motivation for details.

Why This Package?

PydanticAI provides DeferredToolRequests for human-in-the-loop approval, but it's designed for asynchronous, out-of-band approval flows. This package provides an alternative for synchronous, blocking approval - a fundamentally different pattern.

PydanticAI's Deferred Tools (async/out-of-band)

Agent Run → Returns with pending tools → [Time passes] → User approves via API/webhook → Resume agent

The deferred pattern is ideal when:

  • User isn't present during execution (web apps, background jobs)
  • Approval happens out-of-band (email links, admin dashboards, Slack buttons)
  • Hours or days may pass between request and approval
  • You need to serialize/persist the pending state

Blocking Approval (this package)

Agent Run → Tool needs approval → [Blocks] → User prompted immediately → [Decides] → Execution continues

The blocking pattern is ideal when:

  • User is present at the terminal (CLI tools, interactive sessions)
  • Approval must happen immediately, inline with execution
  • The agent run should complete in one continuous session
  • You want simple "approve and continue" UX without state management

Comparison

Aspect Deferred (PydanticAI) Blocking (this package)
Execution Agent run completes, returns pending Agent run pauses mid-execution
Timing Minutes to days between request/approval Immediate, synchronous
User presence Not required during execution Must be present
State Must serialize/persist pending state No state management needed
Resume Explicit resume call with decisions Automatic after user input
Best for Web apps, APIs, async workflows CLI tools, interactive sessions

Rejection and LLM Adjustment

A key advantage of blocking approval is the immediate feedback loop. When a user rejects a tool call, the rejection (and optional note) is returned to the LLM, which can adjust its approach within the same conversation:

def cli_prompt(request: ApprovalRequest) -> ApprovalDecision:
    print(f"Tool: {request.tool_name}")
    print(f"Args: {request.tool_args}")
    response = input("[y]es / [n]o: ")
    if response.lower() == "y":
        return ApprovalDecision(approved=True)
    # User provides feedback for the LLM to adjust
    reason = input("Why? ") or "User rejected"
    return ApprovalDecision(approved=False, note=reason)

Example conversation flow:

User: Delete the old log files

LLM: [calls delete_file(path="application.log")]
     → User rejects: "That's the current log, delete archived ones"

LLM: [calls delete_file(path="logs/archive/2024-01.log")]
     → User approves

LLM: [calls delete_file(path="logs/archive/2024-02.log")]
     → User approves for session

LLM: [remaining archive files auto-approved from session cache]

With deferred approval, the agent run terminates on rejection, requiring a new conversation to retry. With blocking approval, the LLM learns from rejection feedback and adjusts within the same run.

Architecture Overview

ApprovalToolset (wraps any toolset)
    ├── intercepts call_tool()
    ├── calls needs_approval(name, tool_args) — override for custom logic
    ├── default: checks config[tool_name]["pre_approved"]
    ├── consults ApprovalMemory for cached decisions
    ├── calls approval_callback and BLOCKS until user decides
    └── proceeds or raises PermissionError

ApprovalController (manages modes)
    ├── interactive — prompts user via callback
    ├── approve_all — auto-approve (testing)
    └── strict — auto-deny (safety)

Secure by default: Tools not configured with pre_approved: True require approval. This ensures forgotten tools prompt rather than silently execute.

Installation

pip install pydantic-ai-blocking-approval

Quick Start

from pydantic_ai import Agent
from pydantic_ai_blocking_approval import (
    ApprovalController,
    ApprovalDecision,
    ApprovalRequest,
    ApprovalToolset,
)

# Create a callback for interactive approval
def my_approval_callback(request: ApprovalRequest) -> ApprovalDecision:
    print(f"Approve {request.tool_name}? {request.description}")
    response = input("[y/n/s(ession)]: ")
    if response == "s":
        return ApprovalDecision(approved=True, remember="session")
    return ApprovalDecision(approved=response.lower() == "y")

# Wrap your toolset with approval using per-tool config
controller = ApprovalController(mode="interactive", approval_callback=my_approval_callback)
approved_toolset = ApprovalToolset(
    inner=my_toolset,
    approval_callback=controller.approval_callback,
    memory=controller.memory,
    config={
        "safe_tool": {"pre_approved": True},
        # All other tools require approval (secure by default)
    },
)

# Use with PydanticAI agent
agent = Agent(..., toolsets=[approved_toolset])

Approval Modes

The ApprovalController supports three modes:

Mode Behavior Use Case
interactive Prompts user via callback CLI with user present
approve_all Auto-approves all requests Testing, CI
strict Auto-denies all requests Production safety
# For testing - auto-approve everything
controller = ApprovalController(mode="approve_all")

# For CI/production - reject all approval-required operations
controller = ApprovalController(mode="strict")

Integration Patterns

Pattern 1: Config-Based Pre-Approval

Specify which tools skip approval via the config parameter:

approved_toolset = ApprovalToolset(
    inner=my_toolset,
    approval_callback=my_approval_callback,
    config={
        "get_time": {"pre_approved": True},
        "list_files": {"pre_approved": True},
        "get_weather": {"pre_approved": True},
        # All other tools require approval (secure by default)
    },
)

Tools with pre_approved: True skip approval. Tools not in config require approval by default (secure by default).

Pattern 2: Custom Approval Logic via Subclass

For complex tools (like file sandboxes or shell executors), subclass ApprovalToolset and override needs_approval():

class ShellApprovalToolset(ApprovalToolset):
    """Shell command approval with pattern matching."""

    SAFE_COMMANDS = {"ls", "pwd", "echo", "date"}

    def needs_approval(self, name: str, tool_args: dict) -> bool | dict:
        # Check pre_approved config first
        tool_config = self.config.get(name, {})
        if tool_config.get("pre_approved"):
            return False

        # Custom logic for shell_exec
        if name == "shell_exec":
            command = tool_args.get("command", "")
            base_cmd = command.split()[0] if command else ""

            if base_cmd in self.SAFE_COMMANDS:
                return False  # Safe command

            return {"description": f"Execute: {command}"}

        return True  # Default: require approval

# Usage
toolset = ShellApprovalToolset(
    inner=shell_toolset,
    approval_callback=callback,
    config={
        "get_cwd": {"pre_approved": True},  # Additional pre-approved tools
    },
)

See tests/test_integration.py for a complete example with pattern matching for safe commands and dangerous patterns.

Session Approval Caching

When users approve with remember="session", subsequent identical requests are auto-approved:

# First call - prompts user
# User selects "approve for session"
decision = ApprovalDecision(approved=True, remember="session")

# Subsequent identical calls - auto-approved from cache
# (same tool_name + tool_args)

The cache key is (tool_name, tool_args).

API Reference

Types

  • ApprovalRequest - Request object when approval is needed
  • ApprovalDecision - User's decision (approved, note, remember)

Classes

  • ApprovalMemory - Session cache for "approve for session"
  • ApprovalToolset - Wrapper that intercepts tool calls (subclass for custom logic)
  • ApprovalController - Mode-based controller

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pydantic_ai_blocking_approval-0.4.0.tar.gz (205.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

pydantic_ai_blocking_approval-0.4.0-py3-none-any.whl (12.8 kB view details)

Uploaded Python 3

File details

Details for the file pydantic_ai_blocking_approval-0.4.0.tar.gz.

File metadata

File hashes

Hashes for pydantic_ai_blocking_approval-0.4.0.tar.gz
Algorithm Hash digest
SHA256 5c1ec300941b2cc7a57ed05b83500bb85467a62d05e5aae57edf3e95fdee5ae6
MD5 402919092099a6743bc7bd5c84922897
BLAKE2b-256 868ee81a637f0ace8efaf3e4bc4a4f3939af4390c7b1c1725599d63c40294cea

See more details on using hashes here.

File details

Details for the file pydantic_ai_blocking_approval-0.4.0-py3-none-any.whl.

File metadata

File hashes

Hashes for pydantic_ai_blocking_approval-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 f3c15e1f11c8d70c540dabb6a29a919c5f8d5be5e6574e83dbe785ae26ca061d
MD5 8191eca0835ad5f5d43be978794fbe8a
BLAKE2b-256 f523aeccf3d750134cdc8e52fcf0cb12e173250963db177b15369b166bcb707e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page