Skip to main content

No project description provided

Project description

localargo

PyPI - Version PyPI - Python Version

Convenient ArgoCD local development tool

Localargo is a command-line tool that makes ArgoCD development workflows faster and more convenient. It provides streamlined commands for managing local clusters, applications, secrets, port forwarding, and debugging - all designed specifically for ArgoCD development.

Features

  • Cluster Management: Initialize, manage, and switch between Kubernetes clusters
  • Application Management: Create, sync, and manage ArgoCD applications
  • Port Forwarding: Easily access services running in your applications
  • Secrets Management: Create and manage secrets for local development
  • Sync Operations: Sync applications with watch mode for continuous development
  • Templates: Quick-start applications from common templates
  • Debug Tools: Comprehensive debugging and troubleshooting utilities
  • Validation: Validate configurations before deployment

Quick Start

# Install localargo
pip install localargo

# Initialize a local cluster with ArgoCD (uses KinD by default)
localargo cluster init

# Bring up cluster, configure ArgoCD, apply secrets, deploy apps
localargo up

# Create an application from a template
localargo template create my-app --repo https://github.com/myorg/myrepo

# Port forward services for easy access
localargo port-forward start my-service

# Sync and watch for changes
localargo sync --app my-app --watch

Available Commands

Localargo provides the following main commands:

  • cluster: Manage Kubernetes clusters for ArgoCD development

    • init: Initialize a local cluster with ArgoCD
    • status: Show cluster and ArgoCD status
    • list: List available clusters
    • switch: Switch Kubernetes contexts
    • delete: Delete clusters
    • password: Get ArgoCD admin password
  • up: Bring up cluster, configure ArgoCD, apply secrets, deploy apps

  • app: Manage ArgoCD applications

    • deploy: Create/update and sync applications
    • sync: Sync applications
    • status: Show application status
    • logs: Tail application logs
    • list: List applications
    • delete: Delete applications
  • sync: Sync ArgoCD applications or local directories (with watch mode)

  • template: Create ArgoCD applications from templates

    • create: Create application from template
    • list-templates: List available templates
    • show: Show template details
  • port-forward: Manage port forwarding for applications

    • start: Start port forwarding for a service
    • app: Port forward all services in an application
    • list-forwards: List active forwards
    • stop: Stop port forwarding
  • secrets: Manage secrets for local development

  • debug: Debugging and troubleshooting tools

    • validate: Validate application configuration
    • logs: Show ArgoCD application logs
    • events: Show Kubernetes events
  • validate: Validate manifest and show execution plan

  • down: Tear down cluster

  • ca: Manage CA certificates and TLS infrastructure

    • status: Show CA infrastructure status

Table of Contents

Installation

pip install localargo

Development Setup

For contributors and development, we recommend using Mise to set up the complete development environment:

# Install Mise (macOS with Homebrew)
brew install mise

# Install all development tools
mise install

# Create Hatch environment
hatch env create

# All tools will be automatically available

Git Hook Setup

To ensure code quality before every commit, enable the mise-managed pre-commit hook:

mise generate git-pre-commit --write --task=precommit

This creates .git/hooks/pre-commit, which automatically runs:

  • hatch fmt
  • hatch run typecheck
  • hatch run test

If any step fails, the commit will be blocked until fixed.

You can also run it manually at any time:

mise run precommit

Optional Dependencies

For file watching functionality:

pip install localargo[watch]

Manifest Configuration

Localargo uses a localargo.yaml manifest file to declaratively configure your local development environment.

Basic Structure

cluster:
  - name: my-cluster
    provider: kind  # or k3s

ingress:
  namespace: ingress-nginx
  secretName: localargo-ca-cert
  secretKey: crt
  coreDnsRewrite:
    enabled: true          # default: true
    domains:
      - localtest.me       # default: ["localtest.me"]

apps:
  - my-app:
      namespace: my-namespace
      app_file: app.yaml

repo_creds:
  - github:
      repoURL: https://github.com/myorg
      username: git
      password: ${GITHUB_TOKEN}

secrets:
  - db_password:
      namespace: my-namespace
      secretName: my-secrets
      secretKey: db-password
      secretValue:
        - fromEnv: DATABASE_PASSWORD

Ingress Configuration

The ingress section configures the nginx ingress controller and related settings:

  • coreDnsRewrite: Automatically configures CoreDNS to rewrite *.localtest.me queries to the ingress-nginx service. This allows pods inside the cluster to resolve ingress hostnames (which normally resolve to 127.0.0.1 externally). Enabled by default—no hostAliases hacks needed!

Secrets Configuration

The secrets section allows you to declaratively define Kubernetes secrets. Each secret entry specifies where the secret value comes from.

From Environment Variables

Source secret values from environment variables:

secrets:
  - api_key:
      namespace: core
      secretName: app-secrets
      secretKey: api-key
      secretValue:
        - fromEnv: API_KEY

Random Base64 Values

Generate cryptographically secure random bytes encoded as base64. The number specifies the byte count (not the output string length):

secrets:
  - encryption_key:
      namespace: core
      secretName: crypto-secrets
      secretKey: encryption-key
      secretValue:
        - randomBase64: 32  # 32 bytes -> 44 character base64 string

Random Hex Values

Generate cryptographically secure random bytes encoded as lowercase hexadecimal. The number specifies the byte count:

secrets:
  - session_id:
      namespace: core
      secretName: session-secrets
      secretKey: session-id
      secretValue:
        - randomHex: 16  # 16 bytes -> 32 character hex string

Complete Example

secrets:
  # From environment variable
  - db_password:
      namespace: backend
      secretName: database-credentials
      secretKey: password
      secretValue:
        - fromEnv: DATABASE_PASSWORD

  # Random 256-bit encryption key (base64 encoded)
  - encryption_key:
      namespace: backend
      secretName: crypto-config
      secretKey: aes-key
      secretValue:
        - randomBase64: 32

  # Random session secret (hex encoded)
  - session_secret:
      namespace: backend
      secretName: session-config
      secretKey: secret
      secretValue:
        - randomHex: 64

  # Multiple keys in the same secret (separate entries, same secretName)
  - jwt_secret:
      namespace: backend
      secretName: auth-config
      secretKey: jwt-secret
      secretValue:
        - randomBase64: 64

  - refresh_token_secret:
      namespace: backend
      secretName: auth-config
      secretKey: refresh-secret
      secretValue:
        - randomBase64: 64

Documentation

Full documentation is available at docs/ and can be built locally using mdBook.

To build the documentation:

# Install mdBook (if not already installed)
cargo install mdbook

# Build the docs
cd docs && mdbook build

# Or using Hatch
hatch run docs:build

License

localargo is distributed under the terms of the MIT license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

localargo-0.2.2.tar.gz (110.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

localargo-0.2.2-py3-none-any.whl (94.7 kB view details)

Uploaded Python 3

File details

Details for the file localargo-0.2.2.tar.gz.

File metadata

  • Download URL: localargo-0.2.2.tar.gz
  • Upload date:
  • Size: 110.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for localargo-0.2.2.tar.gz
Algorithm Hash digest
SHA256 6f11837be4e03d00001cb942cb702efca6f2862434d42058136b60d102addc05
MD5 c07db76a803ae9ec5defaa6bdc9f2c02
BLAKE2b-256 45739e7d6e3b15b0d9e9a92cb71f6420509a2c807abb2893de796387326d0aaa

See more details on using hashes here.

Provenance

The following attestation bundles were made for localargo-0.2.2.tar.gz:

Publisher: python-publish.yml on williamkborn/localargo

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file localargo-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: localargo-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 94.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for localargo-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 47c2c78af3d6eaf884e937cd2738bb50b254d22bcba1f3dcd62fd9f16cd85790
MD5 d7a90c7ad6d27add459892d51187a19b
BLAKE2b-256 8073f9ff0d948c1756aae67cf6bb59fec32cbf4b6da08ce0135021fc71b04930

See more details on using hashes here.

Provenance

The following attestation bundles were made for localargo-0.2.2-py3-none-any.whl:

Publisher: python-publish.yml on williamkborn/localargo

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page