secure-keys 1.1.5 → 1.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f38d1903b0db1bc0c74be10cdd4fe9bb89b9fe382242044d41efd9c4073a46a0
4
- data.tar.gz: 99fe683eebc62357e7aca8cf4059fdebeeb2841d222798855eade07c64890cf4
3
+ metadata.gz: 5d04d67ee5f704fd01ffc5d2da16d538b8509766f3b3ef5825d25b25f935ee6e
4
+ data.tar.gz: b700e3b82632b93d86003152ed0616726e290577be02e792ec9434f5ec338f41
5
5
  SHA512:
6
- metadata.gz: eb1f652179ab0dded9342942b641cab6e54275dd4189288fcb35c8d7d6579100bb48c885b7284c1bc0272a92b676ba28aaec56f72c53fdf5c53d8270ad510a47
7
- data.tar.gz: 07de752a4490cafebdf53b734bbd06595f19fd1e35aab1ad00e7521c7d4b0f3ca36eeff0a45229e4c9b2415e1248971f1ff46a0f131867c0773d69a85a5b390f
6
+ metadata.gz: fa4592abef86b893f8e9e21c798c7bf24645112fdc2464b1b23e94c1f407792cca4b5cac41271da50a761ff9ece5fa5e011887b518358148cf260fdb9337e7d2
7
+ data.tar.gz: 4bae104fcba9b490233ac2d66bc438499059ee295bbfb90e86ce01d31ba2cc1259bd3ab99fd7d3ea2948745336e9f2cac9cd8d6c74bc10bd4aa34faeeb56a70b
data/README.md CHANGED
@@ -1,5 +1,5 @@
1
1
  <div style="display: flex; gap: 10px; padding-bottom: 20px;">
2
- <img src="https://img.shields.io/badge/version-1.1.5-cyan" alt="SecureKeys version">
2
+ <img src="https://img.shields.io/badge/version-1.1.7-cyan" alt="SecureKeys version">
3
3
 
4
4
  <img src="https://img.shields.io/badge/iOS-^13.0-blue" alt="iOS version 13.0">
5
5
 
@@ -138,12 +138,13 @@ secure-keys --help
138
138
  Usage: secure-keys [--options]
139
139
 
140
140
  -h, --help Use the provided commands to select the params
141
- --xcframework Add the xcframework to the target
141
+ --ci Enable CI mode (default: false)
142
142
  -d, --delimiter DELIMITER The delimiter to use for the key access (default: ",")
143
143
  --[no-]generate Generate the SecureKeys.xcframework
144
144
  -i, --identifier IDENTIFIER The identifier to use for the key access (default: "secure-keys")
145
145
  --verbose Enable verbose mode (default: false)
146
146
  -v, --version Show the secure-keys version
147
+ --xcframework Add the xcframework to the target
147
148
  ```
148
149
 
149
150
  To avoid defining the `SECURE_KEYS_IDENTIFIER` and `SECURE_KEYS_DELIMITER` env variables, you can use the `--identifier` and `--delimiter` options.
@@ -9,6 +9,7 @@ module SecureKeys
9
9
 
10
10
  # Configure the default arguments
11
11
  @arguments = {
12
+ ci: false,
12
13
  delimiter: nil,
13
14
  generate: true,
14
15
  identifier: nil,
@@ -2,8 +2,8 @@
2
2
 
3
3
  require 'optparse'
4
4
  require_relative '../../globals/globals'
5
- require_relative './handler'
6
- require_relative './xcframework/parser'
5
+ require_relative 'handler'
6
+ require_relative 'xcframework/parser'
7
7
 
8
8
  module SecureKeys
9
9
  module Core
@@ -15,7 +15,7 @@ module SecureKeys
15
15
  super('Usage: secure-keys [--options]')
16
16
  separator('')
17
17
 
18
- # Configure the arguement parser
18
+ # Configure the argument parser
19
19
  configure!
20
20
  order!(into: Handler.arguments)
21
21
  configure_sub_arguments
@@ -29,20 +29,18 @@ module SecureKeys
29
29
  puts self
30
30
  exit(0)
31
31
  end
32
-
33
- on('--xcframework', 'Add the xcframework to the target') do
34
- XCFramework::Parser.new
35
- end
36
-
32
+ on('--ci', TrueClass, 'Enable CI mode (default: false)')
37
33
  on('-d', '--delimiter DELIMITER', String, "The delimiter to use for the key access (default: \"#{Globals.default_key_delimiter}\")")
38
34
  on('--[no-]generate', TrueClass, 'Generate the SecureKeys.xcframework')
39
35
  on('-i', '--identifier IDENTIFIER', String, "The identifier to use for the key access (default: \"#{Globals.default_key_access_identifier}\")")
40
36
  on('--verbose', TrueClass, 'Enable verbose mode (default: false)')
41
-
42
37
  on('-v', '--version', 'Show the secure-keys version') do
43
38
  puts "secure-keys version: v#{SecureKeys::VERSION}"
44
39
  exit(0)
45
40
  end
41
+ on('--xcframework', 'Add the xcframework to the target') do
42
+ XCFramework::Parser.new
43
+ end
46
44
  end
47
45
 
48
46
  # Configure the sub arguments
@@ -2,7 +2,7 @@
2
2
 
3
3
  require 'optparse'
4
4
  require_relative '../../../globals/globals'
5
- require_relative './handler'
5
+ require_relative 'handler'
6
6
 
7
7
  module SecureKeys
8
8
  module Core
@@ -15,7 +15,7 @@ module SecureKeys
15
15
  super('Usage: secure-keys --xcframework [--options]')
16
16
  separator('')
17
17
 
18
- # Configure the arguement parser
18
+ # Configure the argument parser
19
19
  configure!
20
20
  order!(into: Handler.arguments)
21
21
  end
@@ -1,7 +1,7 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
3
  require 'open3'
4
- require_relative './logger'
4
+ require_relative 'logger'
5
5
  require_relative '../globals/globals'
6
6
 
7
7
  module SecureKeys
@@ -49,8 +49,6 @@ module SecureKeys
49
49
  return yield(exit_status || $CHILD_STATUS, output, command) if block_given?
50
50
 
51
51
  [output, exit_status || $CHILD_STATUS, command]
52
- rescue StandardError => e
53
- raise e
54
52
  ensure
55
53
  Encoding.default_external = previous_encoding.first
56
54
  Encoding.default_internal = previous_encoding.last
@@ -8,7 +8,7 @@ module SecureKeys
8
8
  # @param key [String] the key of the environment variable to fetch
9
9
  # @return [String] the value of the environment variable
10
10
  def fetch(key:)
11
- ENV[key]
11
+ ENV.fetch(key)
12
12
  rescue StandardError
13
13
  puts "❌ Error fetching the key: #{key} from ENV variables"
14
14
  end
@@ -1,13 +1,13 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
- require_relative './globals/globals'
4
- require_relative './environment/ci'
5
- require_relative './environment/keychain'
6
- require_relative './utils/swift/writer'
7
- require_relative './utils/swift/package'
8
- require_relative './utils/swift/swift'
9
- require_relative './utils/swift/xcframework'
10
- require_relative './utils/openssl/cipher'
3
+ require_relative 'globals/globals'
4
+ require_relative 'environment/ci'
5
+ require_relative 'environment/keychain'
6
+ require_relative 'utils/swift/writer'
7
+ require_relative 'utils/swift/package'
8
+ require_relative 'utils/swift/swift'
9
+ require_relative 'utils/swift/xcframework'
10
+ require_relative 'utils/openssl/cipher'
11
11
 
12
12
  module SecureKeys
13
13
  module Core
@@ -16,7 +16,7 @@ module SecureKeys
16
16
  # Check for Jenkins, Travis CI, ... environment variables
17
17
  %w[JENKINS_HOME JENKINS_URL TRAVIS CI APPCENTER_BUILD_ID TEAMCITY_VERSION GO_PIPELINE_NAME bamboo_buildKey GITLAB_CI XCS TF_BUILD GITHUB_ACTION GITHUB_ACTIONS BITRISE_IO BUDDY CODEBUILD_BUILD_ARN].any? do |current|
18
18
  ENV[current].to_s.to_boolean
19
- end
19
+ end || Core::Console::Argument::Handler.fetch(key: :ci).to_s.to_boolean
20
20
  end
21
21
 
22
22
  # Check if the current build is running on CircleCI
@@ -1,5 +1,5 @@
1
- require_relative './string/to_bool'
2
- require_relative './string/camelize'
1
+ require_relative 'string/to_bool'
2
+ require_relative 'string/camelize'
3
3
 
4
4
  module Kernel
5
5
  include BooleanCasting
@@ -1,6 +1,6 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
- require_relative './swift'
3
+ require_relative 'swift'
4
4
  require_relative '../../console/shell'
5
5
 
6
6
  module SecureKeys
@@ -1,7 +1,7 @@
1
1
  #!/usr/bin/env ruby
2
2
  # rubocop:disable Layout/HeredocIndentation
3
3
 
4
- require_relative './swift'
4
+ require_relative 'swift'
5
5
 
6
6
  module SecureKeys
7
7
  module Swift
@@ -25,9 +25,7 @@ module SecureKeys
25
25
  # Write the keys to the file
26
26
  def write
27
27
  # Write the file
28
- File.open("#{key_directory}/#{key_file}", 'w') do |file|
29
- file.write(key_swift_file_template(content: formatted_keys))
30
- end
28
+ File.write("#{key_directory}/#{key_file}", key_swift_file_template(content: formatted_keys))
31
29
  end
32
30
 
33
31
  # Generate the formatted keys content using Swift code format
@@ -1,6 +1,6 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
- require_relative './swift'
3
+ require_relative 'swift'
4
4
  require_relative '../../globals/globals'
5
5
  require_relative '../../console/shell'
6
6
  require_relative '../../console/logger'
data/lib/keys.rb CHANGED
@@ -1,11 +1,11 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
- require_relative './core/utils/extensions/kernel'
4
- require_relative './core/generator'
5
- require_relative './core/globals/globals'
6
- require_relative './core/console/logger'
7
- require_relative './core/console/arguments/parser'
8
- require_relative './core/utils/swift/xcframework'
3
+ require_relative 'core/utils/extensions/kernel'
4
+ require_relative 'core/generator'
5
+ require_relative 'core/globals/globals'
6
+ require_relative 'core/console/logger'
7
+ require_relative 'core/console/arguments/parser'
8
+ require_relative 'core/utils/swift/xcframework'
9
9
 
10
10
  module SecureKeys
11
11
  def self.run
data/lib/version.rb CHANGED
@@ -1,8 +1,9 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
3
  module SecureKeys
4
- VERSION = '1.1.5'.freeze
4
+ VERSION = '1.1.7'.freeze
5
5
  SUMMARY = 'Secure Keys is a simple tool for managing your secret keys'.freeze
6
6
  DESCRIPTION = 'Secure Keys is a simple tool to manage your secret keys in your iOS project'.freeze
7
7
  HOMEPAGE_URI = 'https://github.com/derian-cordoba/secure-keys'.freeze
8
+ GEM_HOMEPAGE_URI = 'https://rubygems.pkg.github.com'.freeze
8
9
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: secure-keys
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.5
4
+ version: 1.1.7
5
5
  platform: ruby
6
6
  authors:
7
7
  - Derian Córdoba
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-03-16 00:00:00.000000000 Z
11
+ date: 2025-05-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: base64
@@ -164,62 +164,6 @@ dependencies:
164
164
  - - "~>"
165
165
  - !ruby/object:Gem::Version
166
166
  version: 1.27.0
167
- - !ruby/object:Gem::Dependency
168
- name: rspec
169
- requirement: !ruby/object:Gem::Requirement
170
- requirements:
171
- - - "~>"
172
- - !ruby/object:Gem::Version
173
- version: 3.13.0
174
- type: :development
175
- prerelease: false
176
- version_requirements: !ruby/object:Gem::Requirement
177
- requirements:
178
- - - "~>"
179
- - !ruby/object:Gem::Version
180
- version: 3.13.0
181
- - !ruby/object:Gem::Dependency
182
- name: rubocop
183
- requirement: !ruby/object:Gem::Requirement
184
- requirements:
185
- - - "~>"
186
- - !ruby/object:Gem::Version
187
- version: 1.71.2
188
- type: :development
189
- prerelease: false
190
- version_requirements: !ruby/object:Gem::Requirement
191
- requirements:
192
- - - "~>"
193
- - !ruby/object:Gem::Version
194
- version: 1.71.2
195
- - !ruby/object:Gem::Dependency
196
- name: ruby-debug-ide
197
- requirement: !ruby/object:Gem::Requirement
198
- requirements:
199
- - - "~>"
200
- - !ruby/object:Gem::Version
201
- version: 0.7.5
202
- type: :development
203
- prerelease: false
204
- version_requirements: !ruby/object:Gem::Requirement
205
- requirements:
206
- - - "~>"
207
- - !ruby/object:Gem::Version
208
- version: 0.7.5
209
- - !ruby/object:Gem::Dependency
210
- name: simplecov
211
- requirement: !ruby/object:Gem::Requirement
212
- requirements:
213
- - - "~>"
214
- - !ruby/object:Gem::Version
215
- version: 0.22.0
216
- type: :development
217
- prerelease: false
218
- version_requirements: !ruby/object:Gem::Requirement
219
- requirements:
220
- - - "~>"
221
- - !ruby/object:Gem::Version
222
- version: 0.22.0
223
167
  description: Secure Keys is a simple tool to manage your secret keys in your iOS project
224
168
  email:
225
169
  - derianricardo451@gmail.com
@@ -260,6 +204,7 @@ metadata:
260
204
  homepage_uri: https://github.com/derian-cordoba/secure-keys
261
205
  source_code_uri: https://github.com/derian-cordoba/secure-keys
262
206
  changelog_uri: https://github.com/derian-cordoba/secure-keys/releases
207
+ rubygems_mfa_required: 'true'
263
208
  post_install_message:
264
209
  rdoc_options: []
265
210
  require_paths: