How do I troubleshoot command executor?
Posted: Wed Aug 26, 2020 8:31 pm
I have a few workflows that upload to GoogleDrive, I accomplish this using Google's backup and sync app. It works ok, but is a bit slow and there is no way for FFAStrans to "know" when a file has completed uploading to Drive. I found this on github and set it up. It's pretty slick, let's you upload/download/delete files on Google Drive using command line. For instance this command will upload the file zoom.mp4 to the drive I've authorized, to the folder with id 1TT1dim_fJ_x9Vasdfasdfa as a multipart upload. I attempted to make this work in FFAStrans so I attached a watch folder to a command executor node containing the following and I get the following error and this works, which I thought was the exact thing the command executor was doing Now I don't expect anybody to troubleshoot this obscure app I am trying to use. I would like some help understanding why I can't get it to fail executing the same command outside FFAStrans. Perhaps another way to phrase my question is how do I replicate the FFAStrans command executor function outside of FFAStrans to help with troubleshooting?
Code: Select all
"C:\Users\myusername\Desktop\ggsrun\ggsrun.exe upload" --nc -tz denver -p 1TT1dim_fJ_x9Vasdfasdfa --chunk 8 -f test.mp4 -j
Code: Select all
%comspec% /c ""C:\Users\myusername\Desktop\ggsrun\ggsrun.exe" upload --nc -tz denver -p 1TT1dim_fJ_x9Vasdfasdfa --chunk 8 -f "%s_source%" -j"
That's odd because it's acting as if I haven't authorized ggsrun yet to access my google drive, but I have because the command works fine from the command line outside FFAStrans. This worksCommand executor@KCNCEN250-04: Process exited with error code: 1 (Error: No materials for retrieving accesstoken. Please download 'client_secret.json'._)
Code: Select all
"C:\Users\myusername\Desktop\ggsrun\ggsrun.exe" upload --nc -tz denver -p 1TT1dim_fJ_x9Vasdfasdfa --chunk 8 -f test.mp4 -j
Code: Select all
C:\Windows\system32\cmd.exe /C ""C:\Users\myusername\Desktop\ggsrun\ggsrun.exe" upload --nc -tz denver -p 1TT1dim_fJ_x9Vasdfasdfa --chunk 8 -f test.mp4 -j"