Agent Skills: ArgoCD CLI Login

|

UncategorizedID: laurigates/claude-plugins/argocd-login

Install this agent skill to your local

pnpm dlx add-skill https://github.com/laurigates/claude-plugins/tree/HEAD/kubernetes-plugin/skills/argocd-login

Skill Files

Browse the full folder contents for argocd-login.

Download Skill

Loading file tree…

kubernetes-plugin/skills/argocd-login/SKILL.md

Skill Metadata

Name
argocd-login
Description
"ArgoCD CLI auth with SSO and gRPC-Web. Use when the user mentions ArgoCD login, argocd authentication, SSO auth, or accessing ArgoCD applications and clusters."

ArgoCD CLI Login

ArgoCD CLI authentication with SSO for the Data Portal cluster.

When to Use This Skill

| Use this skill when... | Use kubernetes-operations instead when... | |---|---| | Authenticating to ArgoCD CLI via SSO | Working directly with kubectl against the cluster | | Resolving ArgoCD CLI auth errors before running argocd commands | Inspecting Kubernetes workloads without going through ArgoCD | | Setting up gRPC-Web access to argocd.dataportal.fi | Using kubectl-debugging to debug a specific pod or node |

When to Use

Use this skill automatically when:

  • User requests ArgoCD login or authentication
  • User mentions accessing ArgoCD cluster or applications
  • User needs to interact with ArgoCD CLI tools
  • Authentication errors occur when using ArgoCD commands

Authentication Command

argocd login argocd.dataportal.fi --grpc-web --sso

Command Breakdown

  • argocd.dataportal.fi - Data Portal ArgoCD server endpoint
  • --grpc-web - Enable gRPC-Web protocol (required for web-based SSO)
  • --sso - Use Single Sign-On authentication (opens browser for OAuth2 flow)

Usage Flow

  1. Detect authentication need:

    • User explicitly requests login
    • ArgoCD command fails with authentication error
    • User mentions accessing ArgoCD cluster
  2. Execute login command:

    argocd login argocd.dataportal.fi --grpc-web --sso
    
  3. Guide user through SSO:

    • Command will open browser automatically
    • User completes SSO authentication in browser
    • CLI receives token upon successful authentication
    • Session is stored in ~/.config/argocd/config
  4. Verify authentication:

    argocd account get-user-info
    

Common ArgoCD Operations (Post-Login)

Application Management

# List applications
argocd app list

# Get application details
argocd app get <app-name>

# Sync application
argocd app sync <app-name>

# View application resources
argocd app resources <app-name>

Cluster Information

# List clusters
argocd cluster list

# Get cluster info
argocd cluster get <cluster-name>

Project Management

# List projects
argocd proj list

# Get project details
argocd proj get <project-name>

Authentication Session

  • Session storage: ~/.config/argocd/config
  • Session persistence: Tokens have configurable expiration
  • Re-authentication: Run login command again when session expires

Troubleshooting

Browser doesn't open

  • Manually open the URL printed by the CLI
  • Complete authentication in browser
  • Token will be received by CLI

gRPC-Web errors

  • Ensure --grpc-web flag is present
  • Check network connectivity to argocd.dataportal.fi
  • Verify firewall/proxy settings allow gRPC-Web traffic

SSO failures

  • Verify SSO provider is accessible
  • Check browser for authentication prompts
  • Ensure popup blockers aren't interfering
  • Try incognito/private browsing mode

Token expiration

  • Re-run login command: argocd login argocd.dataportal.fi --grpc-web --sso
  • Check token validity: argocd account get-user-info

Integration with ArgoCD MCP

This skill complements the ArgoCD MCP server tools:

  • MCP tools (mcp__argocd-mcp__*) require authenticated CLI session
  • Use this skill to establish authentication before MCP operations
  • Both use same configuration (~/.config/argocd/config)

Security Considerations

  • Token storage: CLI tokens stored locally in config file
  • Token scope: Full ArgoCD access (read/write based on RBAC)
  • Token rotation: Re-authenticate periodically for security
  • Shared sessions: CLI and MCP share authentication state

Example Interaction

User: "I need to check the status of my ArgoCD applications"

Claude: I'll log you into ArgoCD first, then check the application status.

[Executes: argocd login argocd.dataportal.fi --grpc-web --sso]

Please complete the SSO authentication in the browser that just opened.
Once authenticated, I'll retrieve your application list.

[After successful auth, executes: argocd app list]

Here are your applications:
...

Related Skills

  • Kubernetes Operations - For kubectl operations on ArgoCD-managed resources
  • GitHub Actions Inspection - For CI/CD pipeline integration with ArgoCD
  • Infrastructure Terraform - For infrastructure managed by ArgoCD applications

References