@quenty/secrets 7.30.4-canary.99eacfd.0 → 7.31.0-canary.882056f.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -3,7 +3,18 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
- ## [7.30.4-canary.99eacfd.0](https://github.com/Quenty/NevermoreEngine/compare/@quenty/secrets@7.30.3...@quenty/secrets@7.30.4-canary.99eacfd.0) (2025-12-12)
6
+ # [7.31.0-canary.882056f.0](https://github.com/Quenty/NevermoreEngine/compare/@quenty/secrets@7.30.4...@quenty/secrets@7.31.0-canary.882056f.0) (2025-12-28)
7
+
8
+
9
+ ### Features
10
+
11
+ * Update declarations and README.md ([882056f](https://github.com/Quenty/NevermoreEngine/commit/882056f4c012f9855a0581750968993fb18241ed))
12
+
13
+
14
+
15
+
16
+
17
+ ## [7.30.4](https://github.com/Quenty/NevermoreEngine/compare/@quenty/secrets@7.30.3...@quenty/secrets@7.30.4) (2025-12-28)
7
18
 
8
19
  **Note:** Version bump only for package @quenty/secrets
9
20
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@quenty/secrets",
3
- "version": "7.30.4-canary.99eacfd.0",
3
+ "version": "7.31.0-canary.882056f.0",
4
4
  "description": "Secrets storage system and API surface",
5
5
  "keywords": [
6
6
  "Roblox",
@@ -25,21 +25,21 @@
25
25
  "Quenty"
26
26
  ],
27
27
  "dependencies": {
28
- "@quenty/cmdrservice": "13.29.4-canary.99eacfd.0",
29
- "@quenty/datastore": "13.25.2",
28
+ "@quenty/cmdrservice": "13.29.4",
29
+ "@quenty/datastore": "13.25.3",
30
30
  "@quenty/ellipticcurvecryptography": "1.7.0",
31
31
  "@quenty/loader": "10.9.0",
32
32
  "@quenty/maid": "3.5.0",
33
- "@quenty/permissionprovider": "14.24.4-canary.99eacfd.0",
33
+ "@quenty/permissionprovider": "14.24.4",
34
34
  "@quenty/promise": "10.12.0",
35
35
  "@quenty/remotefunctionutils": "10.12.0",
36
36
  "@quenty/remoting": "12.21.2",
37
37
  "@quenty/rx": "13.20.0",
38
- "@quenty/servicebag": "11.13.1",
38
+ "@quenty/servicebag": "11.13.2",
39
39
  "@quenty/table": "3.8.0"
40
40
  },
41
41
  "publishConfig": {
42
42
  "access": "public"
43
43
  },
44
- "gitHead": "99eacfd66c3484684fb82fb4655c76afb85c5f81"
44
+ "gitHead": "882056f4c012f9855a0581750968993fb18241ed"
45
45
  }
@@ -258,7 +258,7 @@ function SecretsService:_decrypt(data: SecretsData): (boolean?, string)
258
258
  return true, tostring(decrypted)
259
259
  end
260
260
 
261
- function SecretsService:_handleServerInvoke(player, request)
261
+ function SecretsService:_handleServerInvoke(player: Player, request)
262
262
  if request == SecretsServiceConstants.REQUEST_SECRET_KEY_NAMES_LIST then
263
263
  return self:_promiseHandleList(player):Yield()
264
264
  else
@@ -266,7 +266,7 @@ function SecretsService:_handleServerInvoke(player, request)
266
266
  end
267
267
  end
268
268
 
269
- function SecretsService:_promiseHandleList(player)
269
+ function SecretsService:_promiseHandleList(player: Player)
270
270
  return self._permissionsService
271
271
  :PromisePermissionProvider()
272
272
  :Then(function(provider)