peterw wrote:
> You're trying to execute the LMS server's *eject* command on Linux or
> MacOS? I think you probably need a URL like
> squeezeexec:secret=123456789012&p0=/usr/bin/eject or maybe just
> squeezeexec:secret=123456789012&p0=eject -- including the required
> "secret" argument as mentioned in 'this post'
> (https://forums.slimdevices.com/showthread.php?78259-Playlist-quot-Macro-quot-URL-Commands-Maybe-Kidsplay&p=543452&viewfull=1#post543452)
> and ideally setting "p0" to the full path of the eject command. I
> haven't used squeezexec: in a very long time, but I would expect you
> could use the LMS web "Tune in URL" to test the squeezeexec: URL.
>
> As OPML is XML, you'd encode a URL like
> "squeezeexec:secret=123456789012&p0=/usr/bin/eject" as
> "squeezeexec:secret=123456789012*&*p0=/usr/bin/eject".
>
> Another thing: historically Linux distributions have used a group like
> "cdrom" to limit who can use the CD/DVD drive. You might need to
> permanently add the Unix user that LMS runs as to that group so that it
> can eject the optical disk -- just running the eject command won't be
> enough if the LMS user lacks sufficient privileges.
>
> And the scanner bug I mentioned in 'this post'
> (https://forums.slimdevices.com/showthread.php?78259-Playlist-quot-Macro-quot-URL-Commands-Maybe-Kidsplay&p=544174&viewfull=1#post544174)
> might still cause problems.
>
> I hope that helps!
Thanks.
I tried that, and the parser doesn't skip my playlist item, but the
command is not executed. LMS tries to play the URL as an audio file.
Your squeezecli plugin is installed, end the log shows the following :
Code:
--------------------
[21-04-30 09:59:09.0800] Slim::Schema::RemoteTrack::updateOrCreate (387)
squeezeexec:secret=123456789012&p0=/usr/bin/eject
[21-04-30 09:59:09.0817] Slim::Schema::RemoteTrack::setAttributes (347)
squeezeexec:secret=123456789012&p0=/usr/bin/eject => {
CONTENT_TYPE => "PLUGIN_SQUEEZECLIHANDLER_squeezecmd",
DURATION => 0,
RATING => 0,
REMOTE => 1,
TITLE => "squeezeexec:&p0=/usr/bin/eject",
TITLESEARCH => "SQUEEZEEXEC AMP P0 USR BIN EJECT",
TITLESORT => "SQUEEZEEXEC AMP P0 USR BIN EJECT",
YEAR => 0,
urlmd5 => "a8a0c8ae2f8a224e2b348fa4b10d0f79",
}
--------------------
It doesnt show any secret error line.
------------------------------------------------------------------------
TristanLateingne's Profile:
http://forums.slimdevices.com/member.php?userid=71709
View this thread: http://forums.slimdevices.com/showthread.php?t=78259
_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/mailman/listinfo/discuss