@quenty/permissionprovider 14.19.4-canary.559.339cfa7.0 → 14.20.0-canary.0a5db80.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -3,25 +3,17 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
- ## [14.19.4-canary.559.339cfa7.0](https://github.com/Quenty/NevermoreEngine/compare/@quenty/permissionprovider@14.19.3...@quenty/permissionprovider@14.19.4-canary.559.339cfa7.0) (2025-05-10)
6
+ # [14.20.0-canary.0a5db80.0](https://github.com/Quenty/NevermoreEngine/compare/@quenty/permissionprovider@14.19.2...@quenty/permissionprovider@14.20.0-canary.0a5db80.0) (2025-05-10)
7
7
 
8
8
 
9
9
  ### Bug Fixes
10
10
 
11
- * Additional type checking updates ([05ba29a](https://github.com/Quenty/NevermoreEngine/commit/05ba29a03efc9f3feed74b34f1d9dfb237496214))
11
+ * Additional type checking updates ([7e008c5](https://github.com/Quenty/NevermoreEngine/commit/7e008c58547bd00b5904e56541454a38c8d72ccc))
12
12
 
13
13
 
14
14
  ### Features
15
15
 
16
- * Add even more types ([b31717d](https://github.com/Quenty/NevermoreEngine/commit/b31717d8c9f7620c457f5018a2affa760a65334a))
17
-
18
-
19
-
20
-
21
-
22
- ## [14.19.3](https://github.com/Quenty/NevermoreEngine/compare/@quenty/permissionprovider@14.19.2...@quenty/permissionprovider@14.19.3) (2025-04-10)
23
-
24
- **Note:** Version bump only for package @quenty/permissionprovider
16
+ * Add even more types ([0a5db80](https://github.com/Quenty/NevermoreEngine/commit/0a5db8004684dc3e76fd5944599a22602d48cfa9))
25
17
 
26
18
 
27
19
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@quenty/permissionprovider",
3
- "version": "14.19.4-canary.559.339cfa7.0",
3
+ "version": "14.20.0-canary.0a5db80.0",
4
4
  "description": "Permission provider for Roblox, including authenticating against group membership",
5
5
  "keywords": [
6
6
  "Roblox",
@@ -25,20 +25,20 @@
25
25
  "Quenty"
26
26
  ],
27
27
  "dependencies": {
28
- "@quenty/baseobject": "10.8.4-canary.559.339cfa7.0",
29
- "@quenty/brio": "14.17.4-canary.559.339cfa7.0",
30
- "@quenty/grouputils": "10.10.5-canary.559.339cfa7.0",
31
- "@quenty/loader": "10.8.4-canary.559.339cfa7.0",
32
- "@quenty/maid": "3.4.4-canary.559.339cfa7.0",
33
- "@quenty/playerutils": "8.17.4-canary.559.339cfa7.0",
34
- "@quenty/promise": "10.10.5-canary.559.339cfa7.0",
35
- "@quenty/remoting": "12.18.4-canary.559.339cfa7.0",
36
- "@quenty/rx": "13.17.4-canary.559.339cfa7.0",
37
- "@quenty/servicebag": "11.11.5-canary.559.339cfa7.0",
38
- "@quenty/table": "3.7.5-canary.559.339cfa7.0"
28
+ "@quenty/baseobject": "10.9.0-canary.0a5db80.0",
29
+ "@quenty/brio": "14.18.0-canary.0a5db80.0",
30
+ "@quenty/grouputils": "10.11.0-canary.0a5db80.0",
31
+ "@quenty/loader": "10.9.0-canary.0a5db80.0",
32
+ "@quenty/maid": "3.5.0-canary.0a5db80.0",
33
+ "@quenty/playerutils": "8.18.0-canary.0a5db80.0",
34
+ "@quenty/promise": "10.11.0-canary.0a5db80.0",
35
+ "@quenty/remoting": "12.19.0-canary.0a5db80.0",
36
+ "@quenty/rx": "13.18.0-canary.0a5db80.0",
37
+ "@quenty/servicebag": "11.12.0-canary.0a5db80.0",
38
+ "@quenty/table": "3.8.0-canary.0a5db80.0"
39
39
  },
40
40
  "publishConfig": {
41
41
  "access": "public"
42
42
  },
43
- "gitHead": "339cfa778736f08768ed7305041f6221faa35bfc"
43
+ "gitHead": "0a5db8004684dc3e76fd5944599a22602d48cfa9"
44
44
  }
@@ -11,10 +11,10 @@
11
11
 
12
12
  local require = require(script.Parent.loader).load(script)
13
13
 
14
- local Maid = require("Maid")
15
- local PermissionProviderClient = require("PermissionProviderClient")
16
14
  local PermissionProviderConstants = require("PermissionProviderConstants")
15
+ local PermissionProviderClient = require("PermissionProviderClient")
17
16
  local Promise = require("Promise")
17
+ local Maid = require("Maid")
18
18
  local ServiceBag = require("ServiceBag")
19
19
 
20
20
  local PermissionServiceClient = {}
@@ -88,4 +88,4 @@ function PermissionProviderClient._promiseRemoteFunction(self: PermissionProvide
88
88
  return self._remoteFunctionPromise
89
89
  end
90
90
 
91
- return PermissionProviderClient
91
+ return PermissionProviderClient
@@ -75,15 +75,15 @@ end
75
75
  function PermissionProviderUtils.createConfigFromGame(): PermissionProviderConfig
76
76
  if game.CreatorType == Enum.CreatorType.Group then
77
77
  return PermissionProviderUtils.createGroupRankConfig({
78
- groupId = game.CreatorId,
79
- minAdminRequiredRank = 250,
80
- minCreatorRequiredRank = 254,
78
+ groupId = game.CreatorId;
79
+ minAdminRequiredRank = 250;
80
+ minCreatorRequiredRank = 254;
81
81
  })
82
82
  else
83
83
  return PermissionProviderUtils.createSingleUserConfig({
84
- userId = game.CreatorId,
84
+ userId = game.CreatorId;
85
85
  })
86
86
  end
87
87
  end
88
88
 
89
- return PermissionProviderUtils
89
+ return PermissionProviderUtils
@@ -166,4 +166,4 @@ function BasePermissionProvider._onServerInvoke(self: BasePermissionProvider, pl
166
166
  return result and true or false
167
167
  end
168
168
 
169
- return BasePermissionProvider
169
+ return BasePermissionProvider
@@ -11,11 +11,11 @@ local require = require(script.Parent.loader).load(script)
11
11
  local RunService = game:GetService("RunService")
12
12
 
13
13
  local BasePermissionProvider = require("BasePermissionProvider")
14
+ local PermissionProviderConstants = require("PermissionProviderConstants")
15
+ local Promise = require("Promise")
14
16
  local PermissionLevel = require("PermissionLevel")
15
17
  local PermissionLevelUtils = require("PermissionLevelUtils")
16
- local PermissionProviderConstants = require("PermissionProviderConstants")
17
18
  local PermissionProviderUtils = require("PermissionProviderUtils")
18
- local Promise = require("Promise")
19
19
 
20
20
  local CreatorPermissionProvider = setmetatable({}, BasePermissionProvider)
21
21
  CreatorPermissionProvider.ClassName = "CreatorPermissionProvider"
@@ -50,19 +50,16 @@ end
50
50
  @param permissionLevel PermissionLevel
51
51
  @return Promise<boolean>
52
52
  ]=]
53
- function CreatorPermissionProvider.PromiseIsPermissionLevel(
54
- self: CreatorPermissionProvider,
55
- player: Player,
56
- permissionLevel: PermissionLevel.PermissionLevel
57
- ): Promise.Promise<boolean>
53
+ function CreatorPermissionProvider.PromiseIsPermissionLevel(self: CreatorPermissionProvider, player: Player, permissionLevel: PermissionLevel.PermissionLevel): Promise.Promise<boolean>
58
54
  assert(typeof(player) == "Instance" and player:IsA("Player"), "Bad player")
59
55
  assert(PermissionLevelUtils.isPermissionLevel(permissionLevel), "Bad permissionLevel")
60
56
 
61
- if permissionLevel == PermissionLevel.ADMIN or permissionLevel == PermissionLevel.CREATOR then
57
+ if permissionLevel == PermissionLevel.ADMIN
58
+ or permissionLevel == PermissionLevel.CREATOR then
62
59
  return Promise.resolved(player.UserId == self._userId or RunService:IsStudio())
63
60
  else
64
61
  error("Unknown permissionLevel")
65
62
  end
66
63
  end
67
64
 
68
- return CreatorPermissionProvider
65
+ return CreatorPermissionProvider
@@ -158,10 +158,7 @@ function GroupPermissionProvider._handlePlayer(self: GroupPermissionProvider, pl
158
158
  end)
159
159
  end
160
160
 
161
- function GroupPermissionProvider._promiseRankInGroup(
162
- self: GroupPermissionProvider,
163
- player: Player
164
- ): Promise.Promise<number>
161
+ function GroupPermissionProvider._promiseRankInGroup(self: GroupPermissionProvider, player: Player): Promise.Promise<number>
165
162
  assert(typeof(player) == "Instance", "Bad player")
166
163
 
167
164
  if self._promiseRankPromisesCache[player.UserId] then
@@ -172,4 +169,4 @@ function GroupPermissionProvider._promiseRankInGroup(
172
169
  return self._promiseRankPromisesCache[player.UserId]
173
170
  end
174
171
 
175
- return GroupPermissionProvider
172
+ return GroupPermissionProvider
@@ -21,4 +21,4 @@ function PermissionLevelUtils.isPermissionLevel(permissionLevel: any): boolean
21
21
  return ALLOWED[permissionLevel] == true
22
22
  end
23
23
 
24
- return PermissionLevelUtils
24
+ return PermissionLevelUtils
@@ -9,9 +9,7 @@ serviceBag:GetService(require("PermissionServiceClient"))
9
9
  serviceBag:Init()
10
10
  serviceBag:Start()
11
11
 
12
- serviceBag
13
- :GetService(require("PermissionServiceClient"))
14
- :PromisePermissionProvider()
12
+ serviceBag:GetService(require("PermissionServiceClient")):PromisePermissionProvider()
15
13
  :Then(function(permissionProvider)
16
14
  return permissionProvider:PromiseIsAdmin()
17
15
  end)
@@ -19,4 +17,4 @@ serviceBag
19
17
  print("isAdmin", isAdmin)
20
18
  end)
21
19
 
22
- print("Loaded")
20
+ print("Loaded")