gws-setup

Google Workspace CLI — First-Time Setup

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "gws-setup" with this command: npx skills add googleworkspace/cli

Google Workspace CLI — First-Time Setup

Set up the gws CLI (@googleworkspace/cli) with OAuth credentials and 90+ agent skills for Claude Code. Produces a fully authenticated CLI with skills for Gmail, Drive, Calendar, Sheets, Docs, Chat, Tasks, and more.

Prerequisites

  • Node.js 18+

  • A Google account (personal or Workspace)

  • Access to Google Cloud Console (console.cloud.google.com)

Workflow

Step 1: Pre-flight Checks

Check what's already done and skip completed steps:

Check if gws is installed

which gws && gws --version

Check if client_secret.json exists

ls ~/.config/gws/client_secret.json

Check if already authenticated

gws auth status

If gws auth status shows "status": "success" with scopes, skip to Step 6 (Install Skills).

Step 2: Install the CLI

npm install -g @googleworkspace/cli gws --version

Step 3: Create a GCP Project and OAuth Credentials

The user needs to create OAuth Desktop App credentials in Google Cloud Console. Walk them through each step.

3a. Create or select a GCP project:

Direct the user to: https://console.cloud.google.com/projectcreate

Or use an existing project. Ask the user which they prefer.

3b. Enable Google Workspace APIs:

Direct the user to the API Library for their project: https://console.cloud.google.com/apis/library?project=PROJECT_ID

Enable these APIs (search for each):

  • Gmail API

  • Google Drive API

  • Google Calendar API

  • Google Sheets API

  • Google Docs API

  • Google Chat API (requires extra Chat App config — see below)

  • Tasks API

  • People API

  • Google Slides API

  • Google Forms API

  • Admin SDK API (optional — for Workspace admin features)

3c. Configure Google Chat App (required for Chat API):

Enabling the Chat API alone isn't enough — Google requires a Chat App configuration even for user-context OAuth access. Without this, all Chat API calls return errors.

Direct the user to: https://console.cloud.google.com/apis/api/chat.googleapis.com/hangouts-chat?project=PROJECT_ID

  • Click the Configuration tab

  • Fill in app details (name, avatar, description — values don't matter for CLI use)

  • Under "Functionality", check Spaces and group conversations

  • Under "Connection settings", select Apps Script or HTTP endpoint (pick any — we just need the config to exist)

  • Save

This creates the app identity that the Chat API requires. Messages sent via gws still appear as coming from the authenticated user (OAuth user context), not from a bot.

3e. Configure OAuth consent screen:

Direct the user to: https://console.cloud.google.com/apis/credentials/consent?project=PROJECT_ID

Settings:

  • User Type: External (works for any Google account)

  • App name: gws CLI (or any name)

  • User support email: their email

  • Developer contact: their email

  • Leave scopes blank (gws requests scopes at login time)

  • Add their Google account as a test user (required while app is in "Testing" status)

  • Save and continue through all screens

3f. Create OAuth client ID:

Direct the user to: https://console.cloud.google.com/apis/credentials?project=PROJECT_ID

  • Click Create Credentials → OAuth client ID

  • Application type: Desktop app

  • Name: gws CLI

  • Click Create

  • Copy the JSON or download the client_secret_*.json file

3g. Save the credentials:

Ask the user to provide the client_secret.json content (paste the JSON or provide the downloaded file path).

mkdir -p ~/.config/gws

Write the JSON to ~/.config/gws/client_secret.json . The expected format:

{ "installed": { "client_id": "...", "project_id": "...", "auth_uri": "https://accounts.google.com/o/oauth2/auth", "token_uri": "https://oauth2.googleapis.com/token", "client_secret": "...", "redirect_uris": ["http://localhost"] } }

Step 4: Choose Scopes

Ask the user what level of access they want:

Option Command What it grants

Full access (recommended) gws auth login --full

All Workspace scopes including admin, pubsub, cloud-platform

Core services gws auth login -s gmail,drive,calendar,sheets,docs,chat,tasks

Most-used services only

Minimal gws auth login -s gmail,calendar

Just email and calendar

Recommend full access for power users. The OAuth consent screen shows all requested scopes so the user can review before granting.

Note: If the GCP app is in "Testing" status, scope selection is limited to ~25 scopes. Use -s service1,service2 to request targeted scopes, or publish the app (Publish → In Production) for broader scope access.

Step 5: Authenticate

IMPORTANT: This step prints a very long OAuth URL (30+ scopes) that the user must open in their browser. The URL is too long to copy from terminal output — it wraps across lines and breaks. Always extract it to a file and open it programmatically.

  • Run the login command and capture the output:

gws auth login --full 2>&1 | tee /tmp/gws-auth-output.txt

Or with specific services:

gws auth login -s gmail,drive,calendar,sheets,docs,chat,tasks 2>&1 | tee /tmp/gws-auth-output.txt

Running as a background task is fine — it will complete once the user approves in browser.

  • Extract and open the URL (run separately after output appears):

grep -o 'https://accounts.google.com[^ ]*' /tmp/gws-auth-output.txt > /tmp/gws-auth-url.txt cat /tmp/gws-auth-url.txt | xargs open

If open doesn't work, tell the user: "The auth URL is saved at /tmp/gws-auth-url.txt — open that file and copy the URL."

  • Wait for the user to approve in their browser.

After browser approval, gws stores encrypted credentials at ~/.config/gws/credentials.enc .

Verify:

gws auth status

Should show "status": "success" with the authenticated account and granted scopes.

Step 6: Install Agent Skills

Install the 90+ gws agent skills globally for Claude Code:

npx skills add googleworkspace/cli -g --agent claude-code --all

Verify skills are installed:

ls ~/.claude/skills/gws-* | wc -l

Should show 30+ gws skill directories.

Step 7: Save Credentials for Other Machines

If the user has other machines to set up, suggest exporting the client credentials:

gws auth export

This prints decrypted credentials (including refresh token) to stdout. The client_secret.json file is the portable part — the same OAuth client can be used on any machine, with gws auth login generating fresh user tokens per machine.

Tell the user to save the client_secret.json content somewhere secure (password manager, encrypted note) for use with the gws-install skill on other machines.

Step 8: Verify Everything Works

Run a few commands to confirm:

Check auth

gws auth status

Check calendar

gws calendar +agenda --today

Check email

gws gmail +triage

If any command fails with auth errors, re-run gws auth login with the needed scopes.

Critical Patterns

Testing vs Production OAuth Apps

GCP OAuth apps start in "Testing" status with a 7-day token expiry and ~25 scope limit. For long-term use:

  • Push the app to Production in the OAuth consent screen settings

  • Production apps have no token expiry limit

  • For personal/internal use, Google does not require verification

Scope Reference

Service flag What it enables

gmail

Send, read, manage email, labels, filters

drive

Files, folders, shared drives

calendar

Events, calendars, free/busy

sheets

Read and write spreadsheets

docs

Read and write documents

chat

Spaces, messages

tasks

Task lists and tasks

slides

Presentations

forms

Forms and responses

people

Contacts and profiles

admin

Workspace admin (directory, devices, groups)

Environment Variable Alternative

Instead of client_secret.json , credentials can be provided via environment variables:

export GOOGLE_WORKSPACE_CLI_CLIENT_ID="your-client-id" export GOOGLE_WORKSPACE_CLI_CLIENT_SECRET="your-client-secret" gws auth login

Config Directory

All gws config lives in ~/.config/gws/ :

File Purpose

client_secret.json

OAuth client credentials (portable)

credentials.enc

Encrypted user tokens (per-machine)

token_cache.json

Token refresh cache

cache/

API discovery schema cache

See Also

  • gws-install — Quick setup on additional machines with existing credentials

  • gws-shared — Auth patterns and global flags for gws commands

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

agent-development

No summary provided by upstream source.

Repository SourceNeeds Review
361-jezweb
Coding

developer-toolbox

No summary provided by upstream source.

Repository SourceNeeds Review
359-jezweb
Coding

typescript-mcp

No summary provided by upstream source.

Repository SourceNeeds Review
339-jezweb
Coding

cloudflare-python-workers

No summary provided by upstream source.

Repository SourceNeeds Review
321-jezweb