Releases: dmno-dev/varlock
varlock@0.9.0
Minor Changes
- #615
9c38e3a- Add--no-inject-graphCLI flag tovarlock runto opt out of injecting the__VARLOCK_ENVserialized config graph into the child process environment. This prevents sensitive values from being exposed via environment inspection (e.g.,env,printenv) in interactive shells, long-lived processes, or LLM-driven agents.
Patch Changes
-
#627
f93c23f- Fix: escape*/sequences in item descriptions to prevent premature JSDoc comment closure in generated TypeScript types -
#622
6f90d87- Fix leak detection for Uint8Array/ArrayBuffer response bodiesscanForLeaksnow detects secrets inUint8Array,ArrayBufferView, andArrayBuffervalues. Previously these fell through unscanned, so secrets returned as binary-encoded response bodies (common in Cloudflare Workers) were not caught.
@varlock/keeper-plugin@0.0.2
Patch Changes
-
#545
c1b0943- Add Keeper Security plugin for loading secrets from Keeper vaults via the Secrets Manager SDK. Supports fetching secrets by record UID, title, or Keeper notation syntax, with access to both standard and custom fields. IncludeskeeperSmTokendata type for config token validation,@initKeeper()root decorator for initialization, andkeeper()resolver function for secret retrieval. -
Updated dependencies [
9c38e3a,f93c23f,6f90d87]:- varlock@0.9.0
@varlock/doppler-plugin@0.0.2
@varlock/cloudflare-integration@0.1.0
Minor Changes
-
#622
6f90d87- AddvarlockSvelteKitCloudflarePluginfor SvelteKit + Cloudflare Workers projectsNew
varlockSvelteKitCloudflarePluginexported from@varlock/cloudflare-integration/sveltekitfor SvelteKit projects deploying via@sveltejs/adapter-cloudflare. UnlikevarlockCloudflareVitePlugin, it does not include@cloudflare/vite-plugin(which doesn't support SvelteKit — see cloudflare/workers-sdk#8922). Instead it injects thecloudflare:workersruntime env loader into SvelteKit's SSR entry and externalizes the import so Rollup preserves it in the built_worker.js. Non-sensitive vars and the__VARLOCK_ENVsecret are still uploaded viavarlock-wrangler deploy.Also adds a conflict guard to
varlockCloudflareVitePluginthat errors when the user has manually added@cloudflare/vite-pluginto avoid silent double-registration.
Patch Changes
@varlock/azure-key-vault-plugin@0.1.0
@varlock/akeyless-plugin@0.0.2
varlock@0.8.2
Patch Changes
-
#620
0f3ca3b- Fix regex literal parsing ambiguity with file pathsRemoved grammar-level regex literal (
/pattern/) parsing which caused paths like/folder/foo/barto be incorrectly parsed as regex patterns. Regex-like strings are now detected at runtime by specific consumers (remap()match values,matchestype option) instead of at the grammar level. Unquoted strings that look like/pattern/flagsare treated as regex in those contexts; wrap in quotes to force literal string matching. -
#618
0db7d1d- Fixvarlock runon Windows: correctly build the cmd.exe command string when spawning.cmd/.batfilesPreviously, individual arguments were double-quoted separately (e.g.
"tsx.cmd" "watch" "src/index.ts"). Because cmd.exe's/s /cstrips only the first and last quote from the entire command string, this left a stray"after the command name, causing errors like "The system cannot find the path specified."The fix wraps the entire inner command string in a single pair of outer quotes (e.g.
"tsx.cmd watch src/index.ts"), which is what cmd.exe expects. Paths or arguments that contain spaces are individually quoted inside those outer quotes.Additionally, when
findCommandcannot resolve a bare command name to a.cmd/.batpath, varlock now falls back to routing through cmd.exe so that Windows PATHEXT lookups (e.g.tsx→tsx.cmd,pnpm→pnpm.cmd) are handled automatically.
env-spec-language@0.1.3
Patch Changes
-
#620
0f3ca3b- Fix regex literal parsing ambiguity with file pathsRemoved grammar-level regex literal (
/pattern/) parsing which caused paths like/folder/foo/barto be incorrectly parsed as regex patterns. Regex-like strings are now detected at runtime by specific consumers (remap()match values,matchestype option) instead of at the grammar level. Unquoted strings that look like/pattern/flagsare treated as regex in those contexts; wrap in quotes to force literal string matching.
@env-spec/parser@0.3.1
Patch Changes
-
#620
0f3ca3b- Fix regex literal parsing ambiguity with file pathsRemoved grammar-level regex literal (
/pattern/) parsing which caused paths like/folder/foo/barto be incorrectly parsed as regex patterns. Regex-like strings are now detected at runtime by specific consumers (remap()match values,matchestype option) instead of at the grammar level. Unquoted strings that look like/pattern/flagsare treated as regex in those contexts; wrap in quotes to force literal string matching.