Usage

Dependencies

Examples

Building at scale

Commands

Contributors

Generate secrets

There are scenarios in which users might need to generate a secret key, for example for the master.key file that is used to encrypt files like the signing certificates. For those, Tuist provides a command that generates a cryptographically secure secret:

tuist secret
Copy the content

By using this website, you agree to our cookie policy.