diff options
author | Katharina Fey <kookie@spacekookie.de> | 2018-09-03 23:00:52 +0200 |
---|---|---|
committer | Katharina Fey <kookie@spacekookie.de> | 2018-09-03 23:00:52 +0200 |
commit | 15182c1a4fd14aeda13d2d82a2294e8c7eb3a49d (patch) | |
tree | fbc593fd57416a3773cb65c99c25f7fbe334038e /lockchain-core/src/lib.rs | |
parent | 7872791b07bb71f2d4c9d0cdeb3cd439adbc84ac (diff) |
Generally refactoring some code (this is a bad commit message)
Diffstat (limited to '')
-rw-r--r-- | lockchain-core/src/lib.rs | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/lockchain-core/src/lib.rs b/lockchain-core/src/lib.rs index a7b5b0c..2ec812e 100644 --- a/lockchain-core/src/lib.rs +++ b/lockchain-core/src/lib.rs @@ -11,7 +11,7 @@ //! //! At it's centre, `lockchain-core` defines storage traits. These come in a few //! forms, from `Vault`, being a very generic interface over what is meant as a -//! secure storage collection, to `Record`, being an individual record in such a +//! secure storage collection, to `Record`, being an individual entry in such a //! system. This means that both the nature of `Vault` and `Record` are generic //! implementation details, left to you to pick for your application, depending on //! what fits your needs. @@ -21,7 +21,7 @@ //! padded to generate AES encryption keys. It adds a user management layer that provides //! login, permissions as well as second-factor authentication (such as a yubikey). And it //! provides an easy to use keystore, which binds encrypted keys to user identities, so that -//! encryption never has to be done outside of the users scope. +//! decryption never has to be done outside of the users scope. //! //! --- //! @@ -79,3 +79,10 @@ pub mod users; pub use self::crypto::PackedData; pub use self::meta::{MetaDomain, VaultMetadata}; pub use self::record::{EncryptedBody, Header, Payload, Record}; + +/// Export commonly used types via the prelude +pub mod prelude { + pub use super::crypto::PackedData; + pub use super::meta::{MetaDomain, VaultMetadata}; + pub use super::record::{EncryptedBody, Header, Payload, Record}; +} |