verify_xcode
Verifies that the Xcode installation is properly signed by Apple
This action was implemented after the recent Xcode attack to make sure you're not using a hacked Xcode installation.
verify_xcode | |
---|---|
Supported platforms | ios, mac |
Author | @KrauseFx |
2 Examples
verify_xcode
verify_xcode(xcode_path: "/Applications/Xcode.app")
Parameters
Key | Description | Default |
---|---|---|
xcode_path |
The path to the Xcode installation to test | * |
* = default value is dependent on the user's system
Documentation
To show the documentation in your terminal, run
fastlane action verify_xcode
CLI
It is recommended to add the above action into your Fastfile
, however sometimes you might want to run one-offs. To do so, you can run the following command from your terminal
fastlane run verify_xcode
To pass parameters, make use of the :
symbol, for example
fastlane run verify_xcode parameter1:"value1" parameter2:"value2"
It's important to note that the CLI supports primitive types like integers, floats, booleans, and strings. Arrays can be passed as a comma delimited string (e.g. param:"1,2,3"
). Hashes are not currently supported.
It is recommended to add all fastlane actions you use to your Fastfile
.
Source code
This action, just like the rest of fastlane, is fully open source, view the source code on GitHub