@@ -29,8 +29,7 @@ use crate::{
2929///
3030/// ```rust
3131/// use ed25519_dalek::SigningKey;
32- /// use json_atomic::seal_value;
33- /// use rand::rngs::OsRng;
32+ /// use json_atomic::{seal_value, errors::SealError};
3433/// use serde::Serialize;
3534///
3635/// #[derive(Serialize)]
@@ -39,15 +38,16 @@ use crate::{
3938/// timestamp: u64,
4039/// }
4140///
42- /// let sk = SigningKey::generate(&mut OsRng);
41+ /// // Chave de exemplo (em produção, derive de seed/keystore)
42+ /// let sk = SigningKey::from_bytes(&[0u8; 32]);
4343/// let fact = Fact {
4444/// message: "Hello, World!".into(),
4545/// timestamp: 1735671234,
4646/// };
4747///
4848/// let signed = seal_value(&fact, &sk)?;
4949/// println!("CID: {}", signed.cid_hex());
50- /// # Ok::<(), json_atomic:: SealError>(())
50+ /// # Ok::<(), SealError>(())
5151/// ```
5252pub fn seal_value < T : serde:: Serialize > (
5353 value : & T ,
@@ -88,21 +88,21 @@ pub fn seal_value<T: serde::Serialize>(
8888///
8989/// ```rust
9090/// use ed25519_dalek::SigningKey;
91- /// use json_atomic::{seal_value, verify_seal};
92- /// use rand::rngs::OsRng;
91+ /// use json_atomic::{seal_value, verify_seal, errors::SealError};
9392/// use serde::Serialize;
9493///
9594/// #[derive(Serialize)]
9695/// struct Fact {
9796/// data: String,
9897/// }
9998///
100- /// let sk = SigningKey::generate(&mut OsRng);
99+ /// // Chave de exemplo (em produção, derive de seed/keystore)
100+ /// let sk = SigningKey::from_bytes(&[0u8; 32]);
101101/// let fact = Fact { data: "test".into() };
102102///
103103/// let signed = seal_value(&fact, &sk)?;
104104/// verify_seal(&signed)?; // Verifica integridade e autenticidade
105- /// # Ok::<(), Box<dyn std::error::Error> >(())
105+ /// # Ok::<(), SealError >(())
106106/// ```
107107pub fn verify_seal ( f : & SignedFact ) -> Result < ( ) , VerifyError > {
108108 // Recalcula CID do canonical e compara
@@ -124,11 +124,11 @@ pub fn verify_seal(f: &SignedFact) -> Result<(), VerifyError> {
124124///
125125/// ```rust
126126/// use ed25519_dalek::SigningKey;
127- /// use json_atomic::seal_logline;
127+ /// use json_atomic::{ seal_logline, errors::SealError} ;
128128/// use logline_core::*;
129- /// use rand::rngs::OsRng;
130129///
131- /// let sk = SigningKey::generate(&mut OsRng);
130+ /// // Chave de exemplo (em produção, derive de seed/keystore)
131+ /// let sk = SigningKey::from_bytes(&[0u8; 32]);
132132/// let line = LogLine::builder()
133133/// .who("did:ubl:alice")
134134/// .did(Verb::Approve)
@@ -140,7 +140,7 @@ pub fn verify_seal(f: &SignedFact) -> Result<(), VerifyError> {
140140///
141141/// let signed = seal_logline(&line, &sk)?;
142142/// println!("LogLine CID: {}", signed.cid_hex());
143- /// # Ok::<(), Box<dyn std::error::Error> >(())
143+ /// # Ok::<(), SealError >(())
144144/// ```
145145pub fn seal_logline ( line : & LogLine , sk : & SigningKey ) -> Result < SignedFact , SealError > {
146146 // Reaproveita `serde` derivado do logline-core
0 commit comments