Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

[docs][match] fix typos, improve wording, incorporate improvements to match documentation examples #21302

Merged
merged 2 commits into from
Jul 4, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
6 changes: 4 additions & 2 deletions fastlane/lib/fastlane/actions/docs/sync_code_signing.md
Original file line number Diff line number Diff line change
Expand Up @@ -212,7 +212,7 @@ fastlane match development

<img src="/img/actions/match_appstore_small.gif" width="550" />

This will create a new certificate and provisioning profile (if required) and store them in your selected storage.
This will create a new certificate and provisioning profile (if required) and store them in your selected storage.
If you previously ran _match_ with the configured storage it will automatically install the existing profiles from your storage.

The provisioning profiles are installed in `~/Library/MobileDevice/Provisioning Profiles` while the certificates and private keys are installed in your Keychain.
Expand Down Expand Up @@ -512,9 +512,11 @@ Please be careful when using this option and ensure the certificates and profile
If you want to manually decrypt a file you can.

```no-highlight
openssl aes-256-cbc -k "<password>" -in "<fileYouWantToDecryptPath>" -out "<decryptedFilePath>" -a -d
openssl aes-256-cbc -k "<password>" -in "<fileYouWantToDecryptPath>" -out "<decryptedFilePath>" -a -d -md [md5|sha256]
```

_**Note:** You may need to swap double quotes `"` for single quotes `'` if your match password contains an exclamation mark `!`._

#### Export Distribution Certificate and Private Key as Single .p12 File

_match_ stores the certificate (`.cer`) and the private key (`.p12`) files separately. The following steps will repackage the separate certificate and private key into a single `.p12` file.
Expand Down
2 changes: 1 addition & 1 deletion gym/lib/gym/generators/build_command_generator.rb
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ def pipe
if Gym.config[:disable_xcpretty] || formatter == ''
UI.verbose("Not using an xcodebuild formatter")
elsif !options.empty?
UI.important("Detected legacy xcpretty being used so formatting wth xcpretty")
UI.important("Detected legacy xcpretty being used, so formatting with xcpretty")
UI.important("Option(s) used: #{options.join(', ')}")
pipe += pipe_xcpretty
elsif formatter == 'xcpretty'
Expand Down
2 changes: 1 addition & 1 deletion scan/lib/scan/test_command_generator.rb
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ def pipe
if formatter == ''
UI.verbose("Not using an xcodebuild formatter")
elsif !options.empty?
UI.important("Detected legacy xcpretty being used so formatting wth xcpretty")
UI.important("Detected legacy xcpretty being used, so formatting with xcpretty")
UI.important("Option(s) used: #{options.join(', ')}")
pipe << pipe_xcpretty
elsif formatter == 'xcpretty'
Expand Down
2 changes: 1 addition & 1 deletion snapshot/lib/snapshot/test_command_generator.rb
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ def pipe(log_path: nil)
if Snapshot.config[:disable_xcpretty] || formatter == ''
UI.verbose("Not using an xcodebuild formatter")
elsif !options.empty?
UI.important("Detected legacy xcpretty being used so formatting wth xcpretty")
UI.important("Detected legacy xcpretty being used, so formatting with xcpretty")
UI.important("Option(s) used: #{options.join(', ')}")
pipe += pipe_xcpretty
elsif formatter == 'xcpretty'
Expand Down