No project description provided
Project description
localargo
Convenient ArgoCD local development tool
Localargo is a command-line tool that makes ArgoCD development workflows faster and more convenient. It provides streamlined commands for managing local clusters, applications, secrets, port forwarding, and debugging - all designed specifically for ArgoCD development.
Features
- Cluster Management: Initialize, manage, and switch between Kubernetes clusters
- Application Management: Create, sync, and manage ArgoCD applications
- Port Forwarding: Easily access services running in your applications
- Secrets Management: Create and manage secrets for local development
- Sync Operations: Sync applications with watch mode for continuous development
- Templates: Quick-start applications from common templates
- Debug Tools: Comprehensive debugging and troubleshooting utilities
- Validation: Validate configurations before deployment
Quick Start
# Install localargo
pip install localargo
# Initialize a local cluster with ArgoCD (uses KinD by default)
localargo cluster init
# Bring up cluster, configure ArgoCD, apply secrets, deploy apps
localargo up
# Create an application from a template
localargo template create my-app --repo https://github.com/myorg/myrepo
# Port forward services for easy access
localargo port-forward start my-service
# Sync and watch for changes
localargo sync --app my-app --watch
Available Commands
Localargo provides the following main commands:
-
cluster: Manage Kubernetes clusters for ArgoCD developmentinit: Initialize a local cluster with ArgoCDstatus: Show cluster and ArgoCD statuslist: List available clustersswitch: Switch Kubernetes contextsdelete: Delete clusterspassword: Get ArgoCD admin password
-
up: Bring up cluster, configure ArgoCD, apply secrets, deploy apps -
app: Manage ArgoCD applicationsdeploy: Create/update and sync applicationssync: Sync applicationsstatus: Show application statuslogs: Tail application logslist: List applicationsdelete: Delete applications
-
sync: Sync ArgoCD applications or local directories (with watch mode) -
template: Create ArgoCD applications from templatescreate: Create application from templatelist-templates: List available templatesshow: Show template details
-
port-forward: Manage port forwarding for applicationsstart: Start port forwarding for a serviceapp: Port forward all services in an applicationlist-forwards: List active forwardsstop: Stop port forwarding
-
secrets: Manage secrets for local development -
debug: Debugging and troubleshooting toolsvalidate: Validate application configurationlogs: Show ArgoCD application logsevents: Show Kubernetes events
-
validate: Validate manifest and show execution plan -
down: Tear down cluster -
ca: Manage CA certificates and TLS infrastructurestatus: Show CA infrastructure status
Table of Contents
Installation
pip install localargo
Development Setup
For contributors and development, we recommend using Mise to set up the complete development environment:
# Install Mise (macOS with Homebrew)
brew install mise
# Install all development tools
mise install
# Create Hatch environment
hatch env create
# All tools will be automatically available
Git Hook Setup
To ensure code quality before every commit, enable the mise-managed pre-commit hook:
mise generate git-pre-commit --write --task=precommit
This creates .git/hooks/pre-commit, which automatically runs:
hatch fmthatch run typecheckhatch run test
If any step fails, the commit will be blocked until fixed.
You can also run it manually at any time:
mise run precommit
Optional Dependencies
For file watching functionality:
pip install localargo[watch]
Manifest Configuration
Localargo uses a localargo.yaml manifest file to declaratively configure your local development environment.
Basic Structure
cluster:
- name: my-cluster
provider: kind # or k3s
ingress:
namespace: ingress-nginx
secretName: localargo-ca-cert
secretKey: crt
apps:
- my-app:
namespace: my-namespace
app_file: app.yaml
repo_creds:
- github:
repoURL: https://github.com/myorg
username: git
password: ${GITHUB_TOKEN}
secrets:
- db_password:
namespace: my-namespace
secretName: my-secrets
secretKey: db-password
secretValue:
- fromEnv: DATABASE_PASSWORD
Secrets Configuration
The secrets section allows you to declaratively define Kubernetes secrets. Each secret entry specifies where the secret value comes from.
From Environment Variables
Source secret values from environment variables:
secrets:
- api_key:
namespace: core
secretName: app-secrets
secretKey: api-key
secretValue:
- fromEnv: API_KEY
Random Base64 Values
Generate cryptographically secure random bytes encoded as base64. The number specifies the byte count (not the output string length):
secrets:
- encryption_key:
namespace: core
secretName: crypto-secrets
secretKey: encryption-key
secretValue:
- randomBase64: 32 # 32 bytes -> 44 character base64 string
Random Hex Values
Generate cryptographically secure random bytes encoded as lowercase hexadecimal. The number specifies the byte count:
secrets:
- session_id:
namespace: core
secretName: session-secrets
secretKey: session-id
secretValue:
- randomHex: 16 # 16 bytes -> 32 character hex string
Complete Example
secrets:
# From environment variable
- db_password:
namespace: backend
secretName: database-credentials
secretKey: password
secretValue:
- fromEnv: DATABASE_PASSWORD
# Random 256-bit encryption key (base64 encoded)
- encryption_key:
namespace: backend
secretName: crypto-config
secretKey: aes-key
secretValue:
- randomBase64: 32
# Random session secret (hex encoded)
- session_secret:
namespace: backend
secretName: session-config
secretKey: secret
secretValue:
- randomHex: 64
# Multiple keys in the same secret (separate entries, same secretName)
- jwt_secret:
namespace: backend
secretName: auth-config
secretKey: jwt-secret
secretValue:
- randomBase64: 64
- refresh_token_secret:
namespace: backend
secretName: auth-config
secretKey: refresh-secret
secretValue:
- randomBase64: 64
Documentation
Full documentation is available at docs/ and can be built locally using mdBook.
To build the documentation:
# Install mdBook (if not already installed)
cargo install mdbook
# Build the docs
cd docs && mdbook build
# Or using Hatch
hatch run docs:build
License
localargo is distributed under the terms of the MIT license.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file localargo-0.2.1.tar.gz.
File metadata
- Download URL: localargo-0.2.1.tar.gz
- Upload date:
- Size: 104.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
71514f6737a63c92f5ee4a31cabd207c3441c1b5932c91474149dfe8e2394384
|
|
| MD5 |
d171b8069ddb51fff32c4764ac0b75fe
|
|
| BLAKE2b-256 |
6883b785e31ca520e76a2d2f6d5a70499cbd7446ebfb2efaa05d2366ffc569ed
|
Provenance
The following attestation bundles were made for localargo-0.2.1.tar.gz:
Publisher:
python-publish.yml on williamkborn/localargo
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
localargo-0.2.1.tar.gz -
Subject digest:
71514f6737a63c92f5ee4a31cabd207c3441c1b5932c91474149dfe8e2394384 - Sigstore transparency entry: 774274639
- Sigstore integration time:
-
Permalink:
williamkborn/localargo@52dc470aed3caef084df51dab22b73bfaec53276 -
Branch / Tag:
refs/tags/v0.2.1 - Owner: https://github.com/williamkborn
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@52dc470aed3caef084df51dab22b73bfaec53276 -
Trigger Event:
release
-
Statement type:
File details
Details for the file localargo-0.2.1-py3-none-any.whl.
File metadata
- Download URL: localargo-0.2.1-py3-none-any.whl
- Upload date:
- Size: 90.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ae2ffe7874c13d71cd635d6e8a61ba263e08b3cb6d4cd63f3b249b739992d0bf
|
|
| MD5 |
8a02dc5d931846b715788d0fe96b2ae8
|
|
| BLAKE2b-256 |
34d9ef006771fdacab7a9f9f07f17ad22c53b6536de3b92b1fdc27c1f5662fc5
|
Provenance
The following attestation bundles were made for localargo-0.2.1-py3-none-any.whl:
Publisher:
python-publish.yml on williamkborn/localargo
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
localargo-0.2.1-py3-none-any.whl -
Subject digest:
ae2ffe7874c13d71cd635d6e8a61ba263e08b3cb6d4cd63f3b249b739992d0bf - Sigstore transparency entry: 774274645
- Sigstore integration time:
-
Permalink:
williamkborn/localargo@52dc470aed3caef084df51dab22b73bfaec53276 -
Branch / Tag:
refs/tags/v0.2.1 - Owner: https://github.com/williamkborn
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@52dc470aed3caef084df51dab22b73bfaec53276 -
Trigger Event:
release
-
Statement type: