Security News
Internet Archive Hacked, 31 Million Record Compromised
The Internet Archive's "Wayback Machine" has been hacked and defaced, with 31 millions records compromised.
github.com/tanaikech/ggsrun
This is a CLI tool to execute Google Apps Script (GAS) on a terminal. Also this CLI tool can be used for managing files in Google Drive for OAuth2 and Service Account.
Will you want to develop GAS on your local PC? Generally, when we develop GAS, we have to login to Google using own browser and develop it on the Script Editor. Recently, I have wanted to have more convenient local-environment for developing GAS. So I created this "ggsrun". The main work is to execute GAS on local terminal and retrieve the results from Google. Furthermore, this tool can be also used for managing files in own Google Drive (OAuth2) and Google Drive for Service Account.
Features of "ggsrun" are as follows.
Download an executable file of ggsrun from the release page and import to a directory with path.
or
Use go get.
$ go get -u github.com/tanaikech/ggsrun
IMPORTANT: Please check this.
At April 8, 2019, the specification of Google Apps Script Project was changed. By this, when new GAS project is created after April 8, 2019, in order to use Goole API (Google Apps Script API and Drive API which can be used by ggsrun.), the GAS project is required to link to Cloud Platform Project. When you use the GAS project creted after April 8, 2019, at first, please do this flow.
After the GAS project was linked to Cloud Platform Project by above flow, please do "Basic setting flow" at the next section.
When you click each link of title, you can see the detail information.
115-19njNHlbT-NI0hMPDnVO1sdrw2tJKCAJgOTIAPbi_jq3tOo4lVRov
client_secret.json
using download button.client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://console.cloud.google.com/apis/api/drive.googleapis.com/?project=### project ID ###
$ ggsrun auth
at the directory with client_secret.json
.function main(){return Beacon()}
as sample.gs
.$ ggsrun e2 -s sample.gs -i [Script ID] -j
. Script ID is ID of the project installed the server.Congratulation! You got ggsrun!
Please reauthorize to include a new scope to the access token as follows.
client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://www.googleapis.com/auth/script.projects
to ggsrun.cfg
.client_secret.json
and ggsrun.cfg
.
$ ggsrun auth
Completed!
ggsrun can access to Google Drive using Service Account. When OAuth2 is used, you can see the files and folders in own Google Drive. When Service Account is used, you can see them in Google Drive for Service Account. Namely, the Drive for OAuth2 is different from that for Service Account. Please be careful this. And when Service Account is used, there are what it can do and what it can't do. About them, please read here.
If you have any questions and commissions for me, feel free to tell me using e-mail tanaike@hotmail.com
You can see the Update History at here.
If you want to read the detail manual, please check here.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The Internet Archive's "Wayback Machine" has been hacked and defaced, with 31 millions records compromised.
Security News
TC39 is meeting in Tokyo this week and they have approved nearly a dozen proposals to advance to the next stages.
Security News
Our threat research team breaks down two malicious npm packages designed to exploit developer trust, steal your data, and destroy data on your machine.