secretfile 1.0.2 → 1.0.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7c8046a3800e891151a5e7b618fa73bec9a883b76a9873c3b78b0ad24168674a
4
- data.tar.gz: 2ff840b762bbc941e305716472a4d50f0cf36443a88304bf568c89794be94f0b
3
+ metadata.gz: 8bcb4899c1b254241f93c56d5d0a253966de6d3e240f7b4292218226baaf3944
4
+ data.tar.gz: 7ed8dd7e32922ef84768b205e42ef9d9b6219593d4a89a39fed453fccb79306d
5
5
  SHA512:
6
- metadata.gz: 3b406a0b137e58907110a3cb3fc8eb90f9f34aa4fb37c43c8cee8931c9defb61292b70f466f8ee41ead9430e2b5da697517aad966f76b61dce4aa3fc469ced3e
7
- data.tar.gz: ecdf1aeb021e757f666eb311db17a7f8e781962acbba5986c861ec27a98e7428a7daddfd6af11f32feba40c6402039e19b99d6666477911e6b7711f6317cfa0e
6
+ metadata.gz: e8cf90dab0c5ef771a2e0f5c45723b4d174734dc620ec27f0c6332714ac5e05673a61bcbebd04c6dffb7bb87dafeb3aaf39d239db7bb4e96dab90bc82ab8eaad
7
+ data.tar.gz: 5caed65d89a51db272a3f1b71c22fe8041d212d0306a22f4462c0abe9a33a191588a982156de1fb8884f68b606e2d4eb4f8713b0b4b8fe5f916f21bdb0ce509d
data/CHANGELOG.md CHANGED
@@ -1,3 +1,9 @@
1
+ 1.0.3 / 2021-02-24
2
+
3
+ * Bug fixes
4
+
5
+ * Allow blank lines in Secretfiles
6
+
1
7
  1.0.2 / 2019-07-24
2
8
 
3
9
  * Enhancements
data/Secretfile CHANGED
@@ -3,7 +3,9 @@
3
3
  SECRET1 not/in/vault:set_in_env
4
4
  SECRET2 secret/test:value
5
5
  SECRET3 not/in/vault:expected_to_raise
6
- # amazon sts, for example, requires these all to be gotten at once
6
+ # allow empty lines like the one following this:
7
+
8
+ # amazon sts, for example, requires these all to be gotten at once
7
9
  AWS_ACCESS_KEY_ID aws/sts/myrole:access_key
8
10
  AWS_SECRET_ACCESS_KEY aws/sts/myrole:secret_key
9
11
  AWS_SESSION_TOKEN aws/sts/myrole:security_token
data/lib/secretfile.rb CHANGED
@@ -65,6 +65,7 @@ class Secretfile
65
65
  raise "Expected Secretfile" unless File.readable?(spec_path)
66
66
  @spec = IO.readlines(spec_path).inject({}) do |memo, line|
67
67
  line.chomp!
68
+ next memo if line =~ /\A\s*\z/
68
69
  next memo if line =~ /\A\s*#/
69
70
  line.gsub!(/\$(\{)?([A-Z0-9_]+)(\})?/) do
70
71
  if $1 == '{' and $3 != '}'
@@ -1,3 +1,3 @@
1
1
  class Secretfile
2
- VERSION = '1.0.2'
2
+ VERSION = '1.0.3'
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: secretfile
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.2
4
+ version: 1.0.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Seamus Abshere
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2019-07-24 00:00:00.000000000 Z
11
+ date: 2021-02-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -140,7 +140,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
140
140
  - !ruby/object:Gem::Version
141
141
  version: '0'
142
142
  requirements: []
143
- rubygems_version: 3.0.3
143
+ rubygems_version: 3.1.4
144
144
  signing_key:
145
145
  specification_version: 4
146
146
  summary: Define secret mapping in a Secretfile.