@powerlines/plugin-crypto 0.9.33 → 0.10.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4,7 +4,7 @@
4
4
  *
5
5
  *****************************************/
6
6
 
7
- function i(e){return `
7
+ function s(e){return `
8
8
  /**
9
9
  * The cryptography module provides custom helper functions to support encrypting and decrypting data.
10
10
  *
@@ -14,12 +14,12 @@ function i(e){return `
14
14
  ${fileHeader.getFileHeader(e)}
15
15
 
16
16
  import { xchacha20poly1305, chacha20poly1305 } from "@noble/ciphers/chacha.js";
17
- import { randomBytes, managedNonce } from "@noble/ciphers/utils.js";
17
+ import { randomBytes, managedNonce, hexToBytes } from "@noble/ciphers/utils.js";
18
18
  import { scrypt } from "@noble/hashes/scrypt.js";
19
19
  import { blake3 } from "@noble/hashes/blake3.js";
20
20
  ${e.config.crypto.encryptionKey?`
21
21
  const nonce = randomBytes(24);
22
- const chacha = xchacha20poly1305(new TextEncoder().encode("${e.config.crypto.encryptionKey}"), nonce);
22
+ const chacha = xchacha20poly1305(hexToBytes("${e.config.crypto.encryptionKey}"), nonce);
23
23
 
24
24
  /**
25
25
  * Symmetrically encrypts data using the [ChaCha20-Poly1305](https://en.wikipedia.org/wiki/ChaCha20-Poly1305) cipher.
@@ -68,7 +68,7 @@ export function decrypt(encrypted: string): string {
68
68
  export function encryptWithPassword(password: string, plaintext: string): string {
69
69
  const key = scrypt(
70
70
  new TextEncoder().encode(password),
71
- ${e.config.crypto.salt?e.config.crypto.salt:"nonce"},
71
+ hexToBytes("${e.config.crypto.salt?e.config.crypto.salt:"nonce"}"),
72
72
  1048576, // requires 1GB of RAM to calculate
73
73
  8,
74
74
  1,
@@ -94,7 +94,7 @@ export function encryptWithPassword(password: string, plaintext: string): string
94
94
  export function decryptWithPassword(password: string, encrypted: string): string {
95
95
  const key = scrypt(
96
96
  new TextEncoder().encode(password),
97
- ${e.config.crypto.salt?e.config.crypto.salt:"nonce"},
97
+ hexToBytes("${e.config.crypto.salt?e.config.crypto.salt:"nonce"}"),
98
98
  1048576, // requires 1GB of RAM to calculate
99
99
  8,
100
100
  1,
@@ -121,7 +121,7 @@ export function decryptWithPassword(password: string, encrypted: string): string
121
121
  export function hash(data: string): string {
122
122
  return Buffer.from(
123
123
  blake3(new TextEncoder().encode(data), {
124
- key: new TextEncoder().encode(${e.config.crypto.salt?e.config.crypto.salt:"powerlines"})
124
+ key: ${e.config.crypto.salt?`hexToBytes("${e.config.crypto.salt}")`:'new TextEncoder().encode("powerlines")'})
125
125
  })
126
126
  ).toString("hex");
127
127
  }
@@ -136,4 +136,4 @@ export * from '@noble/hashes/pbkdf2.js';
136
136
  export * from '@noble/hashes/scrypt.js';
137
137
  export * from '@noble/hashes/utils.js';
138
138
 
139
- `}chunkFBBMZ4NC_cjs.a(i,"cryptoModule");exports.cryptoModule=i;
139
+ `}chunkFBBMZ4NC_cjs.a(s,"cryptoModule");exports.cryptoModule=s;
@@ -1,4 +1,4 @@
1
- import { a as CryptoPluginContext } from '../index-CqJoG1K0.cjs';
1
+ import { a as CryptoPluginContext } from '../index-sWc0GdCe.cjs';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
@@ -1,4 +1,4 @@
1
- import { a as CryptoPluginContext } from '../index-CqJoG1K0.js';
1
+ import { a as CryptoPluginContext } from '../index-sWc0GdCe.js';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
@@ -4,7 +4,7 @@ import {a}from'../chunk-UCUR73HG.js';import {getFileHeader}from'powerlines/lib/u
4
4
  *
5
5
  *****************************************/
6
6
 
7
- function c(e){return `
7
+ function i(e){return `
8
8
  /**
9
9
  * The cryptography module provides custom helper functions to support encrypting and decrypting data.
10
10
  *
@@ -14,12 +14,12 @@ function c(e){return `
14
14
  ${getFileHeader(e)}
15
15
 
16
16
  import { xchacha20poly1305, chacha20poly1305 } from "@noble/ciphers/chacha.js";
17
- import { randomBytes, managedNonce } from "@noble/ciphers/utils.js";
17
+ import { randomBytes, managedNonce, hexToBytes } from "@noble/ciphers/utils.js";
18
18
  import { scrypt } from "@noble/hashes/scrypt.js";
19
19
  import { blake3 } from "@noble/hashes/blake3.js";
20
20
  ${e.config.crypto.encryptionKey?`
21
21
  const nonce = randomBytes(24);
22
- const chacha = xchacha20poly1305(new TextEncoder().encode("${e.config.crypto.encryptionKey}"), nonce);
22
+ const chacha = xchacha20poly1305(hexToBytes("${e.config.crypto.encryptionKey}"), nonce);
23
23
 
24
24
  /**
25
25
  * Symmetrically encrypts data using the [ChaCha20-Poly1305](https://en.wikipedia.org/wiki/ChaCha20-Poly1305) cipher.
@@ -68,7 +68,7 @@ export function decrypt(encrypted: string): string {
68
68
  export function encryptWithPassword(password: string, plaintext: string): string {
69
69
  const key = scrypt(
70
70
  new TextEncoder().encode(password),
71
- ${e.config.crypto.salt?e.config.crypto.salt:"nonce"},
71
+ hexToBytes("${e.config.crypto.salt?e.config.crypto.salt:"nonce"}"),
72
72
  1048576, // requires 1GB of RAM to calculate
73
73
  8,
74
74
  1,
@@ -94,7 +94,7 @@ export function encryptWithPassword(password: string, plaintext: string): string
94
94
  export function decryptWithPassword(password: string, encrypted: string): string {
95
95
  const key = scrypt(
96
96
  new TextEncoder().encode(password),
97
- ${e.config.crypto.salt?e.config.crypto.salt:"nonce"},
97
+ hexToBytes("${e.config.crypto.salt?e.config.crypto.salt:"nonce"}"),
98
98
  1048576, // requires 1GB of RAM to calculate
99
99
  8,
100
100
  1,
@@ -121,7 +121,7 @@ export function decryptWithPassword(password: string, encrypted: string): string
121
121
  export function hash(data: string): string {
122
122
  return Buffer.from(
123
123
  blake3(new TextEncoder().encode(data), {
124
- key: new TextEncoder().encode(${e.config.crypto.salt?e.config.crypto.salt:"powerlines"})
124
+ key: ${e.config.crypto.salt?`hexToBytes("${e.config.crypto.salt}")`:'new TextEncoder().encode("powerlines")'})
125
125
  })
126
126
  ).toString("hex");
127
127
  }
@@ -136,4 +136,4 @@ export * from '@noble/hashes/pbkdf2.js';
136
136
  export * from '@noble/hashes/scrypt.js';
137
137
  export * from '@noble/hashes/utils.js';
138
138
 
139
- `}a(c,"cryptoModule");export{c as cryptoModule};
139
+ `}a(i,"cryptoModule");export{i as cryptoModule};
@@ -1,5 +1,5 @@
1
1
  export { cryptoModule } from './crypto.cjs';
2
- import '../index-CqJoG1K0.cjs';
2
+ import '../index-sWc0GdCe.cjs';
3
3
  import '@alloy-js/core/jsx-runtime';
4
4
  import '@deepkit/type';
5
5
  import '@stryke/capnp';
@@ -1,5 +1,5 @@
1
1
  export { cryptoModule } from './crypto.js';
2
- import '../index-CqJoG1K0.js';
2
+ import '../index-sWc0GdCe.js';
3
3
  import '@alloy-js/core/jsx-runtime';
4
4
  import '@deepkit/type';
5
5
  import '@stryke/capnp';
@@ -1229,6 +1229,12 @@ interface UnresolvedContext<TResolvedConfig extends ResolvedConfig = ResolvedCon
1229
1229
  * @returns A logger function
1230
1230
  */
1231
1231
  extendLog: (name: string) => LogFn;
1232
+ /**
1233
+ * Generates a checksum representing the current context state
1234
+ *
1235
+ * @returns A promise that resolves to a string representing the checksum
1236
+ */
1237
+ generateChecksum: () => Promise<string>;
1232
1238
  }
1233
1239
  type Context<TResolvedConfig extends ResolvedConfig = ResolvedConfig> = Omit<UnresolvedContext<TResolvedConfig>, "config"> & {
1234
1240
  /**
@@ -4005,7 +4011,7 @@ interface CryptoPluginResolvedConfig extends EnvPluginResolvedConfig {
4005
4011
  /**
4006
4012
  * Options for the Crypto plugin.
4007
4013
  */
4008
- crypto: Omit<CryptoPluginOptions, "env">;
4014
+ crypto: Required<Omit<CryptoPluginOptions, "env">>;
4009
4015
  }
4010
4016
  type CryptoPluginContext<TResolvedConfig extends CryptoPluginResolvedConfig = CryptoPluginResolvedConfig> = EnvPluginContext<TResolvedConfig>;
4011
4017
  declare type __ΩCryptoPluginOptions = any[];
@@ -1229,6 +1229,12 @@ interface UnresolvedContext<TResolvedConfig extends ResolvedConfig = ResolvedCon
1229
1229
  * @returns A logger function
1230
1230
  */
1231
1231
  extendLog: (name: string) => LogFn;
1232
+ /**
1233
+ * Generates a checksum representing the current context state
1234
+ *
1235
+ * @returns A promise that resolves to a string representing the checksum
1236
+ */
1237
+ generateChecksum: () => Promise<string>;
1232
1238
  }
1233
1239
  type Context<TResolvedConfig extends ResolvedConfig = ResolvedConfig> = Omit<UnresolvedContext<TResolvedConfig>, "config"> & {
1234
1240
  /**
@@ -4005,7 +4011,7 @@ interface CryptoPluginResolvedConfig extends EnvPluginResolvedConfig {
4005
4011
  /**
4006
4012
  * Options for the Crypto plugin.
4007
4013
  */
4008
- crypto: Omit<CryptoPluginOptions, "env">;
4014
+ crypto: Required<Omit<CryptoPluginOptions, "env">>;
4009
4015
  }
4010
4016
  type CryptoPluginContext<TResolvedConfig extends CryptoPluginResolvedConfig = CryptoPluginResolvedConfig> = EnvPluginContext<TResolvedConfig>;
4011
4017
  declare type __ΩCryptoPluginOptions = any[];
package/dist/index.cjs CHANGED
@@ -1,7 +1,7 @@
1
- 'use strict';Object.defineProperty(exports,'__esModule',{value:true});var chunkFBBMZ4NC_cjs=require('./chunk-FBBMZ4NC.cjs'),i=require('@powerlines/plugin-env'),types$1=require('@storm-software/config-tools/types'),crypto=require('./components/crypto'),components=require('./components'),types=require('./types');function _interopDefault(e){return e&&e.__esModule?e:{default:e}}var i__default=/*#__PURE__*/_interopDefault(i);/*****************************************
1
+ 'use strict';Object.defineProperty(exports,'__esModule',{value:true});var chunkFBBMZ4NC_cjs=require('./chunk-FBBMZ4NC.cjs'),utils_js=require('@noble/ciphers/utils.js'),n=require('@powerlines/plugin-env'),types$1=require('@storm-software/config-tools/types'),crypto=require('./components/crypto'),components=require('./components'),types=require('./types');function _interopDefault(e){return e&&e.__esModule?e:{default:e}}var n__default=/*#__PURE__*/_interopDefault(n);/*****************************************
2
2
  *
3
3
  * ⚡ Built by Storm Software
4
4
  *
5
5
  *****************************************/
6
6
 
7
- function n(e={}){return {name:"crypto",dependsOn:[i__default.default(e.env)],config(){return {crypto:{salt:e.salt,encryptionKey:e.encryptionKey}}},configResolved(){this.dependencies["@noble/ciphers"]="^2.0.1",this.dependencies["@noble/hashes"]="^2.0.1",this.config.crypto.salt??=this.env.parsed.SALT,this.config.crypto.salt||this.log(types$1.LogLevelLabel.WARN,"No salt provided for the Crypto plugin. It's highly recommended to provide a unique salt via the plugin options or the SALT environment variable."),this.config.crypto.encryptionKey??=this.env.parsed.ENCRYPTION_KEY,this.config.crypto.encryptionKey||this.log(types$1.LogLevelLabel.WARN,"No encryption key provided for the Crypto plugin. It's highly recommended to provide a secure encryption key via the plugin options or the ENCRYPTION_KEY environment variable.");},async prepare(){this.log(types$1.LogLevelLabel.TRACE,"Preparing the Crypto runtime artifacts for the Powerlines project."),await this.emitBuiltin(await Promise.resolve(crypto.cryptoModule(this)),"crypto","crypto.ts");}}}chunkFBBMZ4NC_cjs.a(n,"plugin");var d=n;exports.default=d;exports.plugin=n;Object.keys(components).forEach(function(k){if(k!=='default'&&!Object.prototype.hasOwnProperty.call(exports,k))Object.defineProperty(exports,k,{enumerable:true,get:function(){return components[k]}})});Object.keys(types).forEach(function(k){if(k!=='default'&&!Object.prototype.hasOwnProperty.call(exports,k))Object.defineProperty(exports,k,{enumerable:true,get:function(){return types[k]}})});
7
+ function l(e={}){return {name:"crypto",dependsOn:[n__default.default(e.env)],config(){return {crypto:{salt:e.salt,encryptionKey:e.encryptionKey}}},configResolved(){this.dependencies["@noble/ciphers"]="^2.0.1",this.dependencies["@noble/hashes"]="^2.0.1",this.config.crypto.salt??=this.env.parsed.SALT,this.config.crypto.salt||(this.log(types$1.LogLevelLabel.WARN,"No salt provided to the Crypto plugin - a salt value will be generated automatically. Please note: It's highly recommended to provide a unique salt value via the `salt` plugin option or the `SALT` environment variable."),this.config.crypto.salt=utils_js.bytesToHex(utils_js.randomBytes(12))),this.config.crypto.encryptionKey??=this.env.parsed.ENCRYPTION_KEY,this.config.crypto.encryptionKey||(this.log(types$1.LogLevelLabel.WARN,"No encryption key provided to the Crypto plugin - a secure key will be generated automatically. Please note: it's highly recommended to provide a secure encryption key via the `encryptionKey` plugin option or the `ENCRYPTION_KEY` environment variable."),this.config.crypto.encryptionKey=utils_js.bytesToHex(utils_js.randomBytes(32)));},async prepare(){this.log(types$1.LogLevelLabel.TRACE,"Preparing the Crypto runtime artifacts for the Powerlines project."),await this.emitBuiltin(await Promise.resolve(crypto.cryptoModule(this)),"crypto","crypto.ts");}}}chunkFBBMZ4NC_cjs.a(l,"plugin");var v=l;exports.default=v;exports.plugin=l;Object.keys(components).forEach(function(k){if(k!=='default'&&!Object.prototype.hasOwnProperty.call(exports,k))Object.defineProperty(exports,k,{enumerable:true,get:function(){return components[k]}})});Object.keys(types).forEach(function(k){if(k!=='default'&&!Object.prototype.hasOwnProperty.call(exports,k))Object.defineProperty(exports,k,{enumerable:true,get:function(){return types[k]}})});
package/dist/index.d.cts CHANGED
@@ -1,5 +1,5 @@
1
- import { C as CryptoPluginOptions, P as Plugin, a as CryptoPluginContext } from './index-CqJoG1K0.cjs';
2
- export { c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from './index-CqJoG1K0.cjs';
1
+ import { C as CryptoPluginOptions, P as Plugin, a as CryptoPluginContext } from './index-sWc0GdCe.cjs';
2
+ export { c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from './index-sWc0GdCe.cjs';
3
3
  export { cryptoModule } from './components/crypto.cjs';
4
4
  import '@alloy-js/core/jsx-runtime';
5
5
  import '@deepkit/type';
package/dist/index.d.ts CHANGED
@@ -1,5 +1,5 @@
1
- import { C as CryptoPluginOptions, P as Plugin, a as CryptoPluginContext } from './index-CqJoG1K0.js';
2
- export { c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from './index-CqJoG1K0.js';
1
+ import { C as CryptoPluginOptions, P as Plugin, a as CryptoPluginContext } from './index-sWc0GdCe.js';
2
+ export { c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from './index-sWc0GdCe.js';
3
3
  export { cryptoModule } from './components/crypto.js';
4
4
  import '@alloy-js/core/jsx-runtime';
5
5
  import '@deepkit/type';
package/dist/index.js CHANGED
@@ -1,7 +1,7 @@
1
- import {a}from'./chunk-UCUR73HG.js';import i from'@powerlines/plugin-env';import {LogLevelLabel}from'@storm-software/config-tools/types';import {cryptoModule}from'./components/crypto';export*from'./components';export*from'./types';/*****************************************
1
+ import {a}from'./chunk-UCUR73HG.js';import {bytesToHex,randomBytes}from'@noble/ciphers/utils.js';import n from'@powerlines/plugin-env';import {LogLevelLabel}from'@storm-software/config-tools/types';import {cryptoModule}from'./components/crypto';export*from'./components';export*from'./types';/*****************************************
2
2
  *
3
3
  * ⚡ Built by Storm Software
4
4
  *
5
5
  *****************************************/
6
6
 
7
- function n(e={}){return {name:"crypto",dependsOn:[i(e.env)],config(){return {crypto:{salt:e.salt,encryptionKey:e.encryptionKey}}},configResolved(){this.dependencies["@noble/ciphers"]="^2.0.1",this.dependencies["@noble/hashes"]="^2.0.1",this.config.crypto.salt??=this.env.parsed.SALT,this.config.crypto.salt||this.log(LogLevelLabel.WARN,"No salt provided for the Crypto plugin. It's highly recommended to provide a unique salt via the plugin options or the SALT environment variable."),this.config.crypto.encryptionKey??=this.env.parsed.ENCRYPTION_KEY,this.config.crypto.encryptionKey||this.log(LogLevelLabel.WARN,"No encryption key provided for the Crypto plugin. It's highly recommended to provide a secure encryption key via the plugin options or the ENCRYPTION_KEY environment variable.");},async prepare(){this.log(LogLevelLabel.TRACE,"Preparing the Crypto runtime artifacts for the Powerlines project."),await this.emitBuiltin(await Promise.resolve(cryptoModule(this)),"crypto","crypto.ts");}}}a(n,"plugin");var f=n;export{f as default,n as plugin};
7
+ function l(e={}){return {name:"crypto",dependsOn:[n(e.env)],config(){return {crypto:{salt:e.salt,encryptionKey:e.encryptionKey}}},configResolved(){this.dependencies["@noble/ciphers"]="^2.0.1",this.dependencies["@noble/hashes"]="^2.0.1",this.config.crypto.salt??=this.env.parsed.SALT,this.config.crypto.salt||(this.log(LogLevelLabel.WARN,"No salt provided to the Crypto plugin - a salt value will be generated automatically. Please note: It's highly recommended to provide a unique salt value via the `salt` plugin option or the `SALT` environment variable."),this.config.crypto.salt=bytesToHex(randomBytes(12))),this.config.crypto.encryptionKey??=this.env.parsed.ENCRYPTION_KEY,this.config.crypto.encryptionKey||(this.log(LogLevelLabel.WARN,"No encryption key provided to the Crypto plugin - a secure key will be generated automatically. Please note: it's highly recommended to provide a secure encryption key via the `encryptionKey` plugin option or the `ENCRYPTION_KEY` environment variable."),this.config.crypto.encryptionKey=bytesToHex(randomBytes(32)));},async prepare(){this.log(LogLevelLabel.TRACE,"Preparing the Crypto runtime artifacts for the Powerlines project."),await this.emitBuiltin(await Promise.resolve(cryptoModule(this)),"crypto","crypto.ts");}}}a(l,"plugin");var P=l;export{P as default,l as plugin};
@@ -1,4 +1,4 @@
1
- export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-CqJoG1K0.cjs';
1
+ export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-sWc0GdCe.cjs';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
@@ -1,4 +1,4 @@
1
- export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-CqJoG1K0.js';
1
+ export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-sWc0GdCe.js';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
@@ -1,4 +1,4 @@
1
- export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-CqJoG1K0.cjs';
1
+ export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-sWc0GdCe.cjs';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
@@ -1,4 +1,4 @@
1
- export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-CqJoG1K0.js';
1
+ export { a as CryptoPluginContext, C as CryptoPluginOptions, c as CryptoPluginResolvedConfig, b as CryptoPluginUserConfig, f as __ΩCryptoPluginContext, _ as __ΩCryptoPluginOptions, e as __ΩCryptoPluginResolvedConfig, d as __ΩCryptoPluginUserConfig } from '../index-sWc0GdCe.js';
2
2
  import '@alloy-js/core/jsx-runtime';
3
3
  import '@deepkit/type';
4
4
  import '@stryke/capnp';
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@powerlines/plugin-crypto",
3
- "version": "0.9.33",
3
+ "version": "0.10.1",
4
4
  "type": "module",
5
5
  "description": "A Powerlines plugin that provides unique identifier generation capabilities at runtime by adding the `id` builtin module.",
6
6
  "repository": {
@@ -116,17 +116,18 @@
116
116
  "files": ["dist/**/*"],
117
117
  "keywords": ["powerlines", "storm-software", "powerlines-plugin"],
118
118
  "dependencies": {
119
- "@powerlines/plugin-env": "^0.13.30",
120
- "@storm-software/config-tools": "^1.188.47",
119
+ "@powerlines/plugin-env": "^0.13.33",
120
+ "@storm-software/config-tools": "^1.188.48",
121
121
  "@stryke/path": "^0.19.2",
122
122
  "defu": "^6.1.4",
123
- "powerlines": "^0.23.7"
123
+ "powerlines": "^0.23.10",
124
+ "@noble/ciphers": "^2.0.1"
124
125
  },
125
126
  "devDependencies": {
126
- "@powerlines/nx": "^0.10.24",
127
- "@storm-software/tsup": "^0.2.45",
127
+ "@powerlines/nx": "^0.10.27",
128
+ "@storm-software/tsup": "^0.2.46",
128
129
  "@types/node": "^24.10.1"
129
130
  },
130
131
  "publishConfig": { "access": "public" },
131
- "gitHead": "76575e78b1db97f4786341913ad2ec42ec1de504"
132
+ "gitHead": "5a6b8349dc29bf9e496ed5dee32c6cfb8d9bff4e"
132
133
  }