Generate Harness Connector YAML for integrations and create/test via MCP. Use when user says "create connector", "git connector", "aws connector", "docker connector", "cloud connector", or wants to connect Harness to external services.
83
73%
Does it follow best practices?
Impact
100%
1.13xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/claude/skills/create-connector/SKILL.mdGenerate Harness Connector YAML and create/test via MCP.
harness_create with resource_type connectorharness_execute with action test_connection to verifyconnector:
name: GitHub
identifier: github_connector
type: Github
spec:
url: https://github.com/myorg
type: Account # Account or Repo
authentication:
type: Http
spec:
type: UsernameToken
spec:
username: myuser
tokenRef: github_pat # Secret reference
apiAccess:
type: Token
spec:
tokenRef: github_pat
executeOnDelegate: falseconnector:
name: GitLab
identifier: gitlab_connector
type: Gitlab
spec:
url: https://gitlab.com/myorg
type: Account
authentication:
type: Http
spec:
type: UsernameToken
spec:
username: myuser
tokenRef: gitlab_tokenconnector:
name: Bitbucket
identifier: bitbucket_connector
type: Bitbucket
spec:
url: https://bitbucket.org/myorg
type: Account
authentication:
type: Http
spec:
type: UsernameToken
spec:
username: myuser
tokenRef: bitbucket_app_passwordconnector:
name: AWS
identifier: aws_connector
type: Aws
spec:
credential:
type: ManualConfig # ManualConfig, InheritFromDelegate, Irsa, OidcAuthentication
spec:
accessKeyRef: aws_access_key
secretKeyRef: aws_secret_key
delegateSelectors: [] # Optional: target specific delegates
executeOnDelegate: falseconnector:
name: GCP
identifier: gcp_connector
type: Gcp
spec:
credential:
type: ManualConfig # ManualConfig, InheritFromDelegate, OidcAuthentication
spec:
secretKeyRef: gcp_service_account_key
executeOnDelegate: falseconnector:
name: Azure
identifier: azure_connector
type: Azure
spec:
credential:
type: ManualConfig
spec:
auth:
type: Secret
spec:
secretRef: azure_client_secret
applicationId: <app_id>
tenantId: <tenant_id>
azureEnvironmentType: AZURE # AZURE, AZURE_US_GOVERNMENT
executeOnDelegate: falseconnector:
name: Docker Hub
identifier: dockerhub
type: DockerRegistry
spec:
dockerRegistryUrl: https://index.docker.io/v2/
providerType: DockerHub
auth:
type: UsernamePassword
spec:
username: myuser
passwordRef: dockerhub_passwordconnector:
name: ECR
identifier: ecr_connector
type: Aws
spec:
credential:
type: ManualConfig
spec:
accessKeyRef: aws_access_key
secretKeyRef: aws_secret_keyconnector:
name: K8s Cluster
identifier: k8s_connector
type: K8sCluster
spec:
credential:
type: ManualConfig # ManualConfig, InheritFromDelegate
spec:
masterUrl: https://k8s-api.example.com
auth:
type: ServiceAccount
spec:
serviceAccountTokenRef: k8s_sa_token
caCertRef: k8s_ca_certconnector:
name: Helm Repo
identifier: helm_repo
type: HttpHelmRepo
spec:
helmRepoUrl: https://charts.example.com
auth:
type: UsernamePassword # UsernamePassword or Anonymous
spec:
username: myuser
passwordRef: helm_password
delegateSelectors: []connector:
name: OCI Helm
identifier: oci_helm
type: OciHelmRepo
spec:
helmRepoUrl: oci://registry.example.com/charts
auth:
type: UsernamePassword
spec:
username: myuser
passwordRef: oci_passwordconnector:
name: Nexus
identifier: nexus_connector
type: Nexus
spec:
nexusServerUrl: https://nexus.example.com
version: "3.x" # "2.x" or "3.x"
auth:
type: UsernamePassword
spec:
username: admin
passwordRef: nexus_passwordconnector:
name: Artifactory
identifier: artifactory_connector
type: Artifactory
spec:
artifactoryServerUrl: https://artifactory.example.com
auth:
type: UsernamePassword
spec:
username: admin
passwordRef: artifactory_passwordconnector:
name: Jira
identifier: jira_connector
type: Jira
spec:
jiraUrl: https://mycompany.atlassian.net
auth:
type: UsernamePassword
spec:
username: user@company.com
passwordRef: jira_api_tokenconnector:
name: ServiceNow
identifier: servicenow_connector
type: ServiceNow
spec:
serviceNowUrl: https://mycompany.service-now.com
auth:
type: UsernamePassword
spec:
username: admin
usernameRef: snow_username
passwordRef: snow_passwordCreate connector:
Call MCP tool: harness_create
Parameters:
resource_type: "connector"
org_id: "<organization>"
project_id: "<project>"
body: <connector YAML>Test connection:
Call MCP tool: harness_execute
Parameters:
resource_type: "connector"
action: "test_connection"
resource_id: "<connector_identifier>"
org_id: "<organization>"
project_id: "<project>"Browse available connector types:
Call MCP tool: harness_list
Parameters:
resource_type: "connector_catalogue"harness_execute with action test_connection.account.secret_name for account-level secretssecret_name for project-level secretsdelegateSelectors to target connectors at specific delegatesa000afa
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.