pub mod catlib_service;
pub mod container;
pub mod container_manager;
pub mod dfs;
mod error;
pub mod forest;
mod identity;
mod lss;
pub mod sfo;
mod storage;
pub use container::*;
pub use container_manager::*;
pub use error::*;
pub use forest::*;
pub use identity::master::*;
pub use identity::wildland::*;
pub use lss::*;
pub use sfo::*;
pub use storage::*;
pub use wildland_crypto::error::CryptoError;
pub use wildland_crypto::identity::encrypting_keypair::EncryptingKeypair;
pub use wildland_crypto::identity::{
generate_random_mnemonic,
Identity,
MnemonicPhrase,
SigningKeypair,
};
pub use wildland_crypto::utils;
pub type CorexResult<T> = Result<T, CoreXError>;
pub const DEFAULT_FOREST_KEY: &str = "wildland.forest.0";
#[cfg(test)]
pub mod test_utilities {
use wildland_crypto::identity::SigningKeypair;
use crate::WildlandIdentity;
pub static SIGNING_PUBLIC_KEY: &str =
"1f8ce714b6e52d7efa5d5763fe7412c345f133c9676db33949b8d4f30dc0912f";
pub static SIGNING_SECRET_KEY: &str =
"e02cdfa23ad7d94508108ad41410e556c5b0737e9c264d4a2304a7a45894fc57";
pub fn create_signing_keypair() -> SigningKeypair {
SigningKeypair::try_from_str(SIGNING_PUBLIC_KEY, SIGNING_SECRET_KEY).unwrap()
}
pub fn create_wildland_forest_identity() -> WildlandIdentity {
WildlandIdentity::Forest(0, create_signing_keypair())
}
}