gws-setup

安装量: 61
排名: #12206

安装

npx skills add https://github.com/jezweb/claude-skills --skill gws-setup

Google Workspace CLI — First-Time Setup Set up the gws CLI (@googleworkspace/cli) with OAuth credentials and 90+ agent skills for Claude Code. Produces a fully authenticated CLI with skills for Gmail, Drive, Calendar, Sheets, Docs, Chat, Tasks, and more. Prerequisites Node.js 18+ A Google account (personal or Workspace) Access to Google Cloud Console (console.cloud.google.com) Workflow Step 1: Pre-flight Checks Check what's already done and skip completed steps:

Check if gws is installed

which gws && gws --version

Check if client_secret.json exists

ls ~/.config/gws/client_secret.json

Check if already authenticated

gws auth status
If
gws auth status
shows
"status": "success"
with scopes, skip to Step 6 (Install Skills).
Step 2: Install the CLI
npm
install
-g
@googleworkspace/cli
gws
--version
Step 3: Create a GCP Project and OAuth Credentials
The user needs to create OAuth Desktop App credentials in Google Cloud Console. Walk them through each step.
3a. Create or select a GCP project:
Direct the user to:
https://console.cloud.google.com/projectcreate
Or use an existing project. Ask the user which they prefer.
3b. Enable Google Workspace APIs:
Direct the user to the API Library for their project:
https://console.cloud.google.com/apis/library?project=PROJECT_ID
Enable these APIs (search for each):
Gmail API
Google Drive API
Google Calendar API
Google Sheets API
Google Docs API
Google Chat API (requires extra Chat App config — see below)
Tasks API
People API
Google Slides API
Google Forms API
Admin SDK API (optional — for Workspace admin features)
3c. Configure Google Chat App (required for Chat API):
Enabling the Chat API alone isn't enough — Google requires a Chat App configuration even for user-context OAuth access. Without this, all Chat API calls return errors.
Direct the user to:
https://console.cloud.google.com/apis/api/chat.googleapis.com/hangouts-chat?project=PROJECT_ID
Click the
Configuration
tab
Fill in app details (name, avatar, description — values don't matter for CLI use)
Under "Functionality", check
Spaces and group conversations
Under "Connection settings", select
Apps Script
or
HTTP endpoint
(pick any — we just need the config to exist)
Save
This creates the app identity that the Chat API requires. Messages sent via
gws
still appear as coming from the authenticated user (OAuth user context), not from a bot.
3e. Configure OAuth consent screen:
Direct the user to:
https://console.cloud.google.com/apis/credentials/consent?project=PROJECT_ID
Settings:
User Type:
External
(works for any Google account)
App name:
gws CLI
(or any name)
User support email: their email
Developer contact: their email
Leave scopes blank (gws requests scopes at login time)
Add their Google account as a test user (required while app is in "Testing" status)
Save and continue through all screens
3f. Create OAuth client ID:
Direct the user to:
https://console.cloud.google.com/apis/credentials?project=PROJECT_ID
Click
Create Credentials
OAuth client ID
Application type:
Desktop app
Name:
gws CLI
Click
Create
Copy the JSON or download the
client_secret_*.json
file
3g. Save the credentials:
Ask the user to provide the client_secret.json content (paste the JSON or provide the downloaded file path).
mkdir
-p
~/.config/gws
Write the JSON to
~/.config/gws/client_secret.json
. The expected format:
{
"installed"
:
{
"client_id"
:
"..."
,
"project_id"
:
"..."
,
"auth_uri"
:
"https://accounts.google.com/o/oauth2/auth"
,
"token_uri"
:
"https://oauth2.googleapis.com/token"
,
"client_secret"
:
"..."
,
"redirect_uris"
:
[
"http://localhost"
]
}
}
Step 4: Choose Scopes
Ask the user what level of access they want:
Option
Command
What it grants
Full access
(recommended)
gws auth login --full
All Workspace scopes including admin, pubsub, cloud-platform
Core services
gws auth login -s gmail,drive,calendar,sheets,docs,chat,tasks
Most-used services only
Minimal
gws auth login -s gmail,calendar
Just email and calendar
Recommend
full access
for power users. The OAuth consent screen shows all requested scopes so the user can review before granting.
Note
If the GCP app is in "Testing" status, scope selection is limited to ~25 scopes. Use
-s service1,service2
to request targeted scopes, or publish the app (Publish → In Production) for broader scope access.
Step 5: Authenticate
IMPORTANT
This step prints a very long OAuth URL (30+ scopes) that the user must open in their browser. The URL is too long to copy from terminal output — it wraps across lines and breaks. Always extract it to a file and open it programmatically. Run the login command and capture the output: gws auth login --full 2

&1 | tee /tmp/gws-auth-output.txt

Or with specific services:

gws auth login -s gmail,drive,calendar,sheets,docs,chat,tasks 2>&1 | tee /tmp/gws-auth-output.txt

Running as a background task is fine — it will complete once the user approves in browser. Extract and open the URL (run separately after output appears): grep -o 'https://accounts.google.com[^ ]*' /tmp/gws-auth-output.txt

/tmp/gws-auth-url.txt cat /tmp/gws-auth-url.txt | xargs open If open doesn't work, tell the user: "The auth URL is saved at /tmp/gws-auth-url.txt — open that file and copy the URL." Wait for the user to approve in their browser. After browser approval, gws stores encrypted credentials at ~/.config/gws/credentials.enc . Verify: gws auth status Should show "status": "success" with the authenticated account and granted scopes. Step 6: Install Agent Skills Install the 90+ gws agent skills globally for Claude Code: npx skills add googleworkspace/cli -g --agent claude-code --all Verify skills are installed: ls ~/.claude/skills/gws-* | wc -l Should show 30+ gws skill directories. Step 7: Save Credentials for Other Machines If the user has other machines to set up, suggest exporting the client credentials: gws auth export This prints decrypted credentials (including refresh token) to stdout. The client_secret.json file is the portable part — the same OAuth client can be used on any machine, with gws auth login generating fresh user tokens per machine. Tell the user to save the client_secret.json content somewhere secure (password manager, encrypted note) for use with the gws-install skill on other machines. Step 8: Verify Everything Works Run a few commands to confirm:

Check auth

gws auth status

Check calendar

gws calendar +agenda --today

Check email

gws gmail +triage If any command fails with auth errors, re-run gws auth login with the needed scopes. Critical Patterns Testing vs Production OAuth Apps GCP OAuth apps start in "Testing" status with a 7-day token expiry and ~25 scope limit. For long-term use: Push the app to Production in the OAuth consent screen settings Production apps have no token expiry limit For personal/internal use, Google does not require verification Scope Reference Service flag What it enables gmail Send, read, manage email, labels, filters drive Files, folders, shared drives calendar Events, calendars, free/busy sheets Read and write spreadsheets docs Read and write documents chat Spaces, messages tasks Task lists and tasks slides Presentations forms Forms and responses people Contacts and profiles admin Workspace admin (directory, devices, groups) Environment Variable Alternative Instead of client_secret.json , credentials can be provided via environment variables: export GOOGLE_WORKSPACE_CLI_CLIENT_ID = "your-client-id" export GOOGLE_WORKSPACE_CLI_CLIENT_SECRET = "your-client-secret" gws auth login Config Directory All gws config lives in ~/.config/gws/ : File Purpose client_secret.json OAuth client credentials (portable) credentials.enc Encrypted user tokens (per-machine) token_cache.json Token refresh cache cache/ API discovery schema cache See Also gws-install — Quick setup on additional machines with existing credentials gws-shared — Auth patterns and global flags for gws commands

返回排行榜