From 051e8a793c31b9b507f49ee0e80451b4bcfa0548 Mon Sep 17 00:00:00 2001 From: Abdulrahim Al Methiab Date: Tue, 20 Feb 2024 20:40:53 +0100 Subject: [PATCH] documentation --- identity_stronghold/src/stronghold_jwk_storage.rs | 1 + identity_stronghold/src/tests/test_jwk_storage.rs | 1 + 2 files changed, 2 insertions(+) diff --git a/identity_stronghold/src/stronghold_jwk_storage.rs b/identity_stronghold/src/stronghold_jwk_storage.rs index 1094124535..1062d949af 100644 --- a/identity_stronghold/src/stronghold_jwk_storage.rs +++ b/identity_stronghold/src/stronghold_jwk_storage.rs @@ -66,6 +66,7 @@ impl StrongholdStorage { } } + /// Retrieve the public key corresponding to `key_id`. pub async fn get_public_key(&self, key_id: &KeyId) -> KeyStorageResult { let stronghold = self.get_stronghold().await; let client = get_client(&stronghold)?; diff --git a/identity_stronghold/src/tests/test_jwk_storage.rs b/identity_stronghold/src/tests/test_jwk_storage.rs index d6f0825b91..61e25af808 100644 --- a/identity_stronghold/src/tests/test_jwk_storage.rs +++ b/identity_stronghold/src/tests/test_jwk_storage.rs @@ -68,6 +68,7 @@ async fn key_exists() { // Tests the cases that require persisting to disk, generate, insert and delete. #[tokio::test] async fn write_to_disk() { + iota_stronghold::engine::snapshot::try_set_encrypt_work_factor(0).unwrap(); const PASS: &str = "secure_password"; let file: PathBuf = create_temp_file(); let secret_manager = StrongholdSecretManager::builder()