//! Multi-KMS infrastructure — health + threshold HSM + KMS abstraction.
//!
//! Mitigates the HSM operator collusion threat (actor 5).
//! Submodules:
//!
//! - [`health`] — multi-channel health check (DoH / alternate region /
//! static-IP, N-of-M quorum).
//! - `threshold` (feature `tier-2-multi-kms`) — byte-level GF(256) Shamir
//! `t-of-n` secret sharing for the auto_promote authorization token.
//! - [`journal`] — consumed-token audit journal (in-memory dev impl;
//! production wires a chain-signed persistent backend on top).
//! - [`kms_backend`] — `KmsBackend` trait + [`MockKmsBackend`] Tier-0 impl.
//!
//! Real KMS-specific implementations (AWS, GCP, Azure) sit behind feature
//! gates — see the `tier-2-aws-kms` feature in `Cargo.toml`.
// Threshold HSM is a Tier-2 feature: shells that never run multi-KMS HA
// (Tier-0 dev, Tier-1 free-tier KMS) do not need the Shamir surface and
// would otherwise pay the `getrandom` link cost.
pub use ;
pub use AwsKmsBackend;