aboutsummaryrefslogtreecommitdiff
path: root/lockchain-core/src/init.rs
diff options
context:
space:
mode:
authorKatharina <kookie@spacekookie.de>2019-04-22 02:02:08 +0200
committerGitHub <noreply@github.com>2019-04-22 02:02:08 +0200
commitf12fae4479c5b97ab37823d7aa58d9156e2fc3ad (patch)
treed3cd6576730c904c6d798c956295a989723a59a3 /lockchain-core/src/init.rs
parent9ceda952a1c0d42b11a67dd7d00178c720f9c601 (diff)
Updating crates to 2018 edition (#9)
* Updating main README * Updating lock file * Updating crate ecosystem to Rust 2018 edition
Diffstat (limited to 'lockchain-core/src/init.rs')
-rw-r--r--lockchain-core/src/init.rs15
1 files changed, 8 insertions, 7 deletions
diff --git a/lockchain-core/src/init.rs b/lockchain-core/src/init.rs
index 410974a..2fad6fc 100644
--- a/lockchain-core/src/init.rs
+++ b/lockchain-core/src/init.rs
@@ -1,18 +1,19 @@
-use errors::VaultError;
-use traits::{Body, Vault};
+use crate::errors::VaultError;
+use crate::traits::{Body, Vault};
+use serde::{Serialize, Deserialize};
/// Describes the internal permission layout of a vault
-///
+///
/// ---
-///
+///
/// **Important Note** Because lockchain-core doesn't make assumptions about
/// about the existence of a cryptographic layer, the `UserStore` that
/// handles these secrets assumes they are **not** secret!
-///
+///
/// This means that only already encrypted keys should be given to the
/// generator type, because they will be written to disk **as is** by
/// certain backends!
-///
+///
/// It is in the responsibility of the library user to make sure that all
/// cryptographic operations are handled on the client side. Clear-text
/// keys that are given to a generator
@@ -21,7 +22,7 @@ use traits::{Body, Vault};
pub enum VaultType {
/// Create an all-powerful root user which can access everything
Administrated {
- ///
+ ///
secret: Vec<u8>,
},
/// Similar to `Administrated`