Release Notes
Patch Changes
-
4bca693: fix: credential masking panic and silent token write errors
Fixed
gws auth exportmasking which panicked on short strings and showed
the entire secret instead of masking it. Also fixed silent token cache write
failures insave_to_diskthat returnedOk(())even when the write failed. -
f84ce37: Fix URL template path expansion to safely encode path parameters, including
Sheetsrangevalues with Unicode and reserved characters.{var}expansions
now encode as a path segment,{+var}preserves slashes while encoding each
segment, and invalid path parameter/template mismatches fail fast. -
eb0347a: fix: correct author email typo in package.json
-
70d0cdd: Fix Slides presentations.get failure caused by flatPath placeholder mismatch
When a Discovery Document's
flatPathuses placeholder names that don't match
the method's parameter names (e.g.,{presentationsId}vspresentationId),
build_urlnow falls back to thepathfield which uses RFC 6570 operators
that resolve correctly.Fixes #118
-
37ab483: Add flake.nix for nix & NixOS installs
-
1991d53: Add prominent disclaimer that this is not an officially supported Google product to README, --help, and --version output
Install gws 0.3.5
Install prebuilt binaries via shell script
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/googleworkspace/cli/releases/download/v0.3.5/gws-installer.sh | shInstall prebuilt binaries via powershell script
powershell -ExecutionPolicy Bypass -c "irm https://github.com/googleworkspace/cli/releases/download/v0.3.5/gws-installer.ps1 | iex"Install prebuilt binaries into your npm project
npm install @googleworkspace/cli@0.3.5Download gws 0.3.5
| File | Platform | Checksum |
|---|---|---|
| gws-aarch64-apple-darwin.tar.gz | Apple Silicon macOS | checksum |
| gws-x86_64-apple-darwin.tar.gz | Intel macOS | checksum |
| gws-x86_64-pc-windows-msvc.tar.gz | x64 Windows | checksum |
| gws-x86_64-unknown-linux-gnu.tar.gz | x64 Linux | checksum |
Verifying GitHub Artifact Attestations
The artifacts in this release have attestations generated with GitHub Artifact Attestations. These can be verified by using the GitHub CLI:
gh attestation verify <file-path of downloaded artifact> --repo googleworkspace/cliYou can also download the attestation from GitHub and verify against that directly:
gh attestation verify <file-path of downloaded artifact> --bundle <file-path of downloaded attestation>