secure-keys 1.1.5 → 1.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f38d1903b0db1bc0c74be10cdd4fe9bb89b9fe382242044d41efd9c4073a46a0
4
- data.tar.gz: 99fe683eebc62357e7aca8cf4059fdebeeb2841d222798855eade07c64890cf4
3
+ metadata.gz: 1dff56623bd6d3238471fe2653d46b84c3ca568caf843b77e8b4b3cbe3b297f6
4
+ data.tar.gz: 4b1503864398336730b7c29797146b68c5a7c1debef375c46b9b0c297df210ee
5
5
  SHA512:
6
- metadata.gz: eb1f652179ab0dded9342942b641cab6e54275dd4189288fcb35c8d7d6579100bb48c885b7284c1bc0272a92b676ba28aaec56f72c53fdf5c53d8270ad510a47
7
- data.tar.gz: 07de752a4490cafebdf53b734bbd06595f19fd1e35aab1ad00e7521c7d4b0f3ca36eeff0a45229e4c9b2415e1248971f1ff46a0f131867c0773d69a85a5b390f
6
+ metadata.gz: 177031d47a7265dafa2d3c6830846a84e872537cf684006a2941369bc356e0be2f342defef1017badbe9f4470a8512c7263f3bd4d50a4d3a366c18d3ca863590
7
+ data.tar.gz: 5762ef42a10ac6a74288ecd29edf36746cd6f0e338713eb5cc85d78688bf11fd8011cf077932a309d1c3b951d4efe6f1461e565f34a61868f380e3b44885fb5c
data/README.md CHANGED
@@ -1,5 +1,5 @@
1
1
  <div style="display: flex; gap: 10px; padding-bottom: 20px;">
2
- <img src="https://img.shields.io/badge/version-1.1.5-cyan" alt="SecureKeys version">
2
+ <img src="https://img.shields.io/badge/version-1.1.6-cyan" alt="SecureKeys version">
3
3
 
4
4
  <img src="https://img.shields.io/badge/iOS-^13.0-blue" alt="iOS version 13.0">
5
5
 
@@ -138,12 +138,13 @@ secure-keys --help
138
138
  Usage: secure-keys [--options]
139
139
 
140
140
  -h, --help Use the provided commands to select the params
141
- --xcframework Add the xcframework to the target
141
+ --ci Enable CI mode (default: false)
142
142
  -d, --delimiter DELIMITER The delimiter to use for the key access (default: ",")
143
143
  --[no-]generate Generate the SecureKeys.xcframework
144
144
  -i, --identifier IDENTIFIER The identifier to use for the key access (default: "secure-keys")
145
145
  --verbose Enable verbose mode (default: false)
146
146
  -v, --version Show the secure-keys version
147
+ --xcframework Add the xcframework to the target
147
148
  ```
148
149
 
149
150
  To avoid defining the `SECURE_KEYS_IDENTIFIER` and `SECURE_KEYS_DELIMITER` env variables, you can use the `--identifier` and `--delimiter` options.
@@ -9,6 +9,7 @@ module SecureKeys
9
9
 
10
10
  # Configure the default arguments
11
11
  @arguments = {
12
+ ci: false,
12
13
  delimiter: nil,
13
14
  generate: true,
14
15
  identifier: nil,
@@ -15,7 +15,7 @@ module SecureKeys
15
15
  super('Usage: secure-keys [--options]')
16
16
  separator('')
17
17
 
18
- # Configure the arguement parser
18
+ # Configure the argument parser
19
19
  configure!
20
20
  order!(into: Handler.arguments)
21
21
  configure_sub_arguments
@@ -29,20 +29,18 @@ module SecureKeys
29
29
  puts self
30
30
  exit(0)
31
31
  end
32
-
33
- on('--xcframework', 'Add the xcframework to the target') do
34
- XCFramework::Parser.new
35
- end
36
-
32
+ on('--ci', TrueClass, 'Enable CI mode (default: false)')
37
33
  on('-d', '--delimiter DELIMITER', String, "The delimiter to use for the key access (default: \"#{Globals.default_key_delimiter}\")")
38
34
  on('--[no-]generate', TrueClass, 'Generate the SecureKeys.xcframework')
39
35
  on('-i', '--identifier IDENTIFIER', String, "The identifier to use for the key access (default: \"#{Globals.default_key_access_identifier}\")")
40
36
  on('--verbose', TrueClass, 'Enable verbose mode (default: false)')
41
-
42
37
  on('-v', '--version', 'Show the secure-keys version') do
43
38
  puts "secure-keys version: v#{SecureKeys::VERSION}"
44
39
  exit(0)
45
40
  end
41
+ on('--xcframework', 'Add the xcframework to the target') do
42
+ XCFramework::Parser.new
43
+ end
46
44
  end
47
45
 
48
46
  # Configure the sub arguments
@@ -15,7 +15,7 @@ module SecureKeys
15
15
  super('Usage: secure-keys --xcframework [--options]')
16
16
  separator('')
17
17
 
18
- # Configure the arguement parser
18
+ # Configure the argument parser
19
19
  configure!
20
20
  order!(into: Handler.arguments)
21
21
  end
@@ -16,7 +16,7 @@ module SecureKeys
16
16
  # Check for Jenkins, Travis CI, ... environment variables
17
17
  %w[JENKINS_HOME JENKINS_URL TRAVIS CI APPCENTER_BUILD_ID TEAMCITY_VERSION GO_PIPELINE_NAME bamboo_buildKey GITLAB_CI XCS TF_BUILD GITHUB_ACTION GITHUB_ACTIONS BITRISE_IO BUDDY CODEBUILD_BUILD_ARN].any? do |current|
18
18
  ENV[current].to_s.to_boolean
19
- end
19
+ end || Core::Console::Argument::Handler.fetch(key: :ci).to_s.to_boolean
20
20
  end
21
21
 
22
22
  # Check if the current build is running on CircleCI
data/lib/version.rb CHANGED
@@ -1,7 +1,7 @@
1
1
  #!/usr/bin/env ruby
2
2
 
3
3
  module SecureKeys
4
- VERSION = '1.1.5'.freeze
4
+ VERSION = '1.1.6'.freeze
5
5
  SUMMARY = 'Secure Keys is a simple tool for managing your secret keys'.freeze
6
6
  DESCRIPTION = 'Secure Keys is a simple tool to manage your secret keys in your iOS project'.freeze
7
7
  HOMEPAGE_URI = 'https://github.com/derian-cordoba/secure-keys'.freeze
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: secure-keys
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.5
4
+ version: 1.1.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Derian Córdoba
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-03-16 00:00:00.000000000 Z
11
+ date: 2025-04-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: base64