cocoapods-keys 1.5.0 → 1.5.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 52a2e9e5a65b7647780f3f3bb143293366a86120
4
- data.tar.gz: a2c043948ff253e77f4b4defaaaf17a9fb35f9fe
3
+ metadata.gz: 7b6bfcf0bab03b687190ef1e5400625faad2bee4
4
+ data.tar.gz: 93f770d9b2baa61164d5c7847571ab344f1c12fd
5
5
  SHA512:
6
- metadata.gz: 9aa97fd504108cfce1a9442f45ea009dcce868a0371e258c7992f432da6b66507021e8b03e0a4c94eb1bdea5b5cadc46e658b0d6d322b55504d653e5de787416
7
- data.tar.gz: 695c2710be5f212f3685f065c316eacbe07ef01dcaceca057935a4014d0bff4d3dc3a400e6e42d6e9c2a5ac8a862a550659c753bd44a4155fa3a8b4dba0b4772
6
+ metadata.gz: 5e06492b4df028b9b836e68814e2720642b03d326632d78d93c18ccace6ef7a501e99902ad955050b1533464ba0f575eaac807818918ee496e38b5da6929ddff
7
+ data.tar.gz: d5a4c9f1d84526ed72ed0f1676dca4f7c01372edfdc077a13f5933027eaba91bdd6b9a82409c23bc754709e2d77913a94449fe66366eea32ba32e8a122f71a6b
data/.gitignore CHANGED
@@ -2,3 +2,6 @@
2
2
  pkg
3
3
  .idea/
4
4
  spec/fixtures/dump-key
5
+ vendor
6
+ install
7
+ .bundle
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  ## Master
2
2
 
3
+ ## 1.5.1
4
+
5
+ * Support .env files [x2on]
6
+
3
7
  ## 1.5.0
4
8
 
5
9
  * Minor error handling improvements [orta]
data/Gemfile.lock CHANGED
@@ -1,7 +1,8 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- cocoapods-keys (1.5.0)
4
+ cocoapods-keys (1.5.1)
5
+ dotenv
5
6
  osx_keychain
6
7
 
7
8
  GEM
@@ -47,6 +48,7 @@ GEM
47
48
  cocoapods-try (0.4.3)
48
49
  colored (1.2)
49
50
  diff-lcs (1.2.5)
51
+ dotenv (2.0.2)
50
52
  escape (0.0.4)
51
53
  fuzzy_match (2.0.4)
52
54
  i18n (0.7.0)
data/README.md CHANGED
@@ -104,6 +104,10 @@ CocoaPods-keys has 3 other commands:
104
104
  * `pod keys generate [optional project]`
105
105
  Will generate the obfuscated Objective-C keys class (mainly used internally).
106
106
 
107
+ #### Continuous Integration
108
+
109
+ It's rarely a good idea to mess around with the keychain in your CI, so keys will look for an environment var with the same string before looking in the keychain. Also you could create a `.env` file in your project folder.
110
+
107
111
  #### Security
108
112
 
109
113
  Key security is difficult. Right now even the biggest apps get their keys [leaked](https://threatpost.com/twitter-oauth-api-keys-leaked-030713/77597). This is neatly summed up by John Adams of the Twitter Security Team on [Quora](http://www.quora.com/Twitter-1/How-were-the-Twitter-iPhone-and-Android-OAuth-keys-leaked).
@@ -19,6 +19,7 @@ Gem::Specification.new do |spec|
19
19
  spec.require_paths = ["lib"]
20
20
 
21
21
  spec.add_runtime_dependency "osx_keychain"
22
+ spec.add_runtime_dependency "dotenv"
22
23
  spec.add_development_dependency "bundler", "~> 1.3"
23
24
  spec.add_development_dependency "rake"
24
25
  spec.add_development_dependency "rspec"
@@ -1,3 +1,3 @@
1
1
  module CocoaPodsKeys
2
- VERSION = '1.5.0'
2
+ VERSION = '1.5.1'
3
3
  end
data/lib/plugin.rb CHANGED
@@ -42,11 +42,10 @@ module CocoaPodsKeys
42
42
  add_keys_to_pods(keys_path.relative_path_from(installation_root), user_options)
43
43
 
44
44
  # Remove the shared scheme for this pod
45
- Pod::HooksManager.register('cocoapods-keys', :post_install) do |context, user_options|
46
- shared_scheme_path = "Pods/Pods.xcodeproj/xcshareddata/xcschemes/Keys.xcscheme"
45
+ Pod::HooksManager.register('cocoapods-keys', :post_install) do
46
+ shared_scheme_path = 'Pods/Pods.xcodeproj/xcshareddata/xcschemes/Keys.xcscheme'
47
47
  FileUtils.rm(shared_scheme_path) if File.exist?(shared_scheme_path)
48
48
  end
49
-
50
49
  end
51
50
 
52
51
  def add_keys_to_pods(keys_path, options)
data/lib/preinstaller.rb CHANGED
@@ -11,11 +11,13 @@ module CocoaPodsKeys
11
11
  require 'keyring_liberator'
12
12
  require 'pod/command/keys/set'
13
13
  require 'cocoapods/user_interface'
14
+ require 'dotenv'
14
15
 
15
16
  ui = Pod::UserInterface
16
17
 
17
18
  options = @user_options || {}
18
19
  current_dir = Pathname.pwd
20
+ Dotenv.load
19
21
  project = options.fetch('project') { CocoaPodsKeys::NameWhisperer.get_project_name }
20
22
 
21
23
  keyring = KeyringLiberator.get_current_keyring(project, current_dir)
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cocoapods-keys
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.5.0
4
+ version: 1.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Orta Therox
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2015-09-23 00:00:00.000000000 Z
12
+ date: 2015-09-28 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: osx_keychain
@@ -25,6 +25,20 @@ dependencies:
25
25
  - - ">="
26
26
  - !ruby/object:Gem::Version
27
27
  version: '0'
28
+ - !ruby/object:Gem::Dependency
29
+ name: dotenv
30
+ requirement: !ruby/object:Gem::Requirement
31
+ requirements:
32
+ - - ">="
33
+ - !ruby/object:Gem::Version
34
+ version: '0'
35
+ type: :runtime
36
+ prerelease: false
37
+ version_requirements: !ruby/object:Gem::Requirement
38
+ requirements:
39
+ - - ">="
40
+ - !ruby/object:Gem::Version
41
+ version: '0'
28
42
  - !ruby/object:Gem::Dependency
29
43
  name: bundler
30
44
  requirement: !ruby/object:Gem::Requirement
@@ -148,7 +162,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
148
162
  version: '0'
149
163
  requirements: []
150
164
  rubyforge_project:
151
- rubygems_version: 2.2.2
165
+ rubygems_version: 2.4.8
152
166
  signing_key:
153
167
  specification_version: 4
154
168
  summary: CocoaPods Keys will store sensitive data in your Mac's keychain. Then on