diff options
author | Stuart Stock <stuart@int08h.com> | 2019-08-11 18:06:43 -0500 |
---|---|---|
committer | Stuart Stock <stuart@int08h.com> | 2019-08-11 18:06:43 -0500 |
commit | b7b89a52058b4d2f86cd9e59cd39aeae04113342 (patch) | |
tree | 76f83651841af8ecd2c3c2dc405f42a7a08e1126 /src | |
parent | 6ff01af5253d667818f47c86a32ecbacd4a1ac4f (diff) | |
download | roughenough-b7b89a52058b4d2f86cd9e59cd39aeae04113342.zip |
Update module docs when KMS feature is disabled
Diffstat (limited to 'src')
-rw-r--r-- | src/kms/mod.rs | 12 |
1 files changed, 1 insertions, 11 deletions
diff --git a/src/kms/mod.rs b/src/kms/mod.rs index 6cd3773..96d732c 100644 --- a/src/kms/mod.rs +++ b/src/kms/mod.rs @@ -202,17 +202,7 @@ pub fn load_seed(config: &Box<ServerConfig>) -> Result<Vec<u8>, error::Error> { /// The only supported `kms_protection` value in this build is `plaintext`. Any /// other value will cause a runtime error. /// -/// ## Background -/// -/// Loading behavior depends on the value of `config.kms_protection()`: -/// -/// * If `config.kms_protection() == Plaintext` then the value returned from `config.seed()` -/// is used as-is and assumed to be a 32-byte hexadecimal value. -/// -/// * Otherwise `config.seed()` is assumed to be an encrypted opaque blob generated from -/// a prior `EnvelopeEncryption::encrypt_seed` call. The value of `config.kms_protection()` -/// is parsed as a KMS key id and `EnvelopeEncryption::decrypt_seed` is called to obtain -/// the plaintext seed value. +/// * `config.seed()` is used as-is and assumed to be a 32-byte hexadecimal value /// #[cfg(not(any(feature = "awskms", feature = "gcpkms")))] pub fn load_seed(config: &Box<ServerConfig>) -> Result<Vec<u8>, error::Error> { |