
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
github.com/tanaikech/ggsrun
This is a CLI tool to execute Google Apps Script (GAS) on a terminal. Also this CLI tool can be used for managing files in Google Drive for OAuth2 and Service Account.
Will you want to develop GAS on your local PC? Generally, when we develop GAS, we have to login to Google using own browser and develop it on the Script Editor. Recently, I have wanted to have more convenient local-environment for developing GAS. So I created this "ggsrun". The main work is to execute GAS on local terminal and retrieve the results from Google. Furthermore, this tool can be also used for managing files in own Google Drive (OAuth2) and Google Drive for Service Account.
Features of "ggsrun" are as follows.
Download an executable file of ggsrun from the release page and import to a directory with path.
or
Use go get.
$ go get -u github.com/tanaikech/ggsrun
IMPORTANT: Please check this.
At April 8, 2019, the specification of Google Apps Script Project was changed. By this, when new GAS project is created after April 8, 2019, in order to use Goole API (Google Apps Script API and Drive API which can be used by ggsrun.), the GAS project is required to link to Cloud Platform Project. When you use the GAS project creted after April 8, 2019, at first, please do this flow.
After the GAS project was linked to Cloud Platform Project by above flow, please do "Basic setting flow" at the next section.
When you click each link of title, you can see the detail information.
115-19njNHlbT-NI0hMPDnVO1sdrw2tJKCAJgOTIAPbi_jq3tOo4lVRov
client_secret.json
using download button.client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://console.cloud.google.com/apis/api/drive.googleapis.com/?project=### project ID ###
$ ggsrun auth
at the directory with client_secret.json
.function main(){return Beacon()}
as sample.gs
.$ ggsrun e2 -s sample.gs -i [Script ID] -j
. Script ID is ID of the project installed the server.Congratulation! You got ggsrun!
Please reauthorize to include a new scope to the access token as follows.
client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://www.googleapis.com/auth/script.projects
to ggsrun.cfg
.client_secret.json
and ggsrun.cfg
.
$ ggsrun auth
Completed!
ggsrun can access to Google Drive using Service Account. When OAuth2 is used, you can see the files and folders in own Google Drive. When Service Account is used, you can see them in Google Drive for Service Account. Namely, the Drive for OAuth2 is different from that for Service Account. Please be careful this. And when Service Account is used, there are what it can do and what it can't do. About them, please read here.
If you have any questions and commissions for me, feel free to tell me using e-mail tanaike@hotmail.com
You can see the Update History at here.
If you want to read the detail manual, please check here.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.