#http-status #catalogs #foundry #fulmen

rsfulmen

Rust helper library for the Fulmen ecosystem - foundry catalogs, config utilities, and cross-platform helpers

5 releases

new 0.1.4 Feb 21, 2026
0.1.3 Feb 8, 2026
0.1.2 Jan 8, 2026
0.1.1 Jan 8, 2026
0.1.0 Jan 8, 2026

#101 in Configuration

Download history 9/week @ 2026-01-04 187/week @ 2026-01-11 385/week @ 2026-01-18 676/week @ 2026-01-25 332/week @ 2026-02-01 31/week @ 2026-02-08

1,469 downloads per month

MIT license

1MB
13K SLoC

rsfulmen

License: MIT Rust: 1.83+ Crucible: v0.4.12

Stop reinventing catalogs. Start shipping.

Every team writes their own HTTP status helpers, exit code enums, and country code lookups. rsfulmen provides production-grade Rust implementations derived from a single source of truth—so your Rust services use the same codes as your Go, Python, and TypeScript services.

  • Zero runtime dependencies: All catalogs embedded at compile time
  • Cross-language parity: Same exit codes, signals, and schemas as gofulmen, pyfulmen, tsfulmen
  • Minimal footprint: Feature flags let you include only what you need

Lifecycle Phase: alpha | Version: 0.1.4

📖 Read the complete rsfulmen overview for comprehensive documentation including module catalog and roadmap.

Overview

rsfulmen provides consistent, high-quality implementations of common functionality across the FulmenHQ ecosystem. Built on Crucible's schemas and standards, it ensures uniformity and reliability with idiomatic Rust APIs.

Alpha Status: API may evolve before 1.0. However:

  • Catalog data is stable: Exit codes, signals, country codes, and HTTP statuses derive from Crucible SSOT and won't change without ecosystem-wide coordination
  • Breaking changes documented: All API changes noted in CHANGELOG.md
  • Production-viable for catalogs: The foundry-core feature is suitable for production use

See Repository Lifecycle Standard for quality expectations.

Who Should Use This

Platform Engineers & SREs: Standardize exit codes across all services so alerting thresholds and runbooks work consistently—whether the service is written in Rust, Go, Python, or TypeScript.

Security & Compliance Teams: Fewer runtime dependencies means a smaller attack surface. Embedded catalogs eliminate network calls for reference data. Audit the dependency tree once with cargo tree.

Polyglot Teams: When your organization runs multiple languages, rsfulmen ensures your Rust services speak the same language as the rest of your stack. Same HTTP status groupings. Same signal handling semantics. Same error codes.

Library Authors: Build on rsfulmen's catalogs instead of maintaining your own. The feature flag system lets you depend on only foundry-core (zero heavy deps) while your consumers can add features as needed.

Crucible Integration

What is Crucible?

Crucible is the FulmenHQ single source of truth (SSOT) for schemas, standards, and configuration templates. It ensures consistent APIs, documentation structures, and behavioral contracts across all language foundations (gofulmen, pyfulmen, tsfulmen, rsfulmen).

Why rsfulmen?

Rather than copying Crucible assets into every Rust project, rsfulmen provides idiomatic access through type-safe APIs. This keeps your application lightweight, versioned correctly, and aligned with ecosystem-wide standards.

Where to Learn More:

Crucible Version

rsfulmen embeds a snapshot of Crucible assets at build time. You can query the embedded version programmatically:

use rsfulmen::crucible;

fn main() {
    // Get full metadata
    let meta = crucible::metadata();
    println!("Crucible version: {}", meta.version);
    println!("Commit: {}", meta.commit);
    println!("Synced at: {}", meta.synced_at);
    println!("Sync method: {}", meta.sync_method);

    // Or just the version string (with 'v' prefix)
    println!("Version: {}", crucible::version());
}

Metadata fields:

Field Description
version CalVer Crucible version (e.g., 0.4.12)
commit Git commit SHA of the synced Crucible snapshot
dirty true if synced from uncommitted changes (development only)
synced_at RFC3339 timestamp when sync occurred
sync_method Sync method used (e.g., git_ref)

For manual inspection, see .crucible/metadata/metadata.yaml.

Modules

Config (config)

Use case: Locate configuration files consistently across Linux, macOS, and Windows without reimplementing XDG logic.

Configuration path utilities following the Fulmen Config Path Standard.

  • XDG Base Directory compliance (Linux, macOS, Windows)
  • Application-specific config/data/cache directories
  • Fulmen ecosystem directory helpers
  • Legacy config path fallback support
use rsfulmen::config::{get_fulmen_config_dir, get_app_config_dir, get_xdg_base_dirs};

// Get Fulmen ecosystem config directory
let fulmen_config = get_fulmen_config_dir();
// Linux: ~/.config/fulmen
// macOS: ~/Library/Application Support/Fulmen
// Windows: %APPDATA%\Fulmen

// Get app-specific directories
let app_config = get_app_config_dir("myapp");
let xdg = get_xdg_base_dirs();
println!("Config home: {:?}", xdg.config_home);

Foundry (foundry)

Use case: Access standardized catalogs (countries, HTTP statuses, exit codes) that match your Go/Python/TypeScript services exactly.

Enterprise-grade foundation utilities providing consistent cross-language implementations from Crucible catalogs. All data is embedded at compile time — no network dependencies required.

Country Codes

Use case: Validate and normalize country codes in API requests without maintaining your own ISO 3166-1 dataset.

ISO 3166-1 country code lookups with triple-index support.

use rsfulmen::foundry::country_codes::{lookup_by_alpha2, lookup_by_alpha3, lookup_by_numeric};

let usa = lookup_by_alpha2("US").unwrap();
assert_eq!(usa.name, "United States of America");
assert_eq!(usa.alpha3, "USA");

// Case-insensitive lookups
let japan = lookup_by_alpha3("jpn").unwrap();
assert_eq!(japan.alpha2, "JP");

// Numeric codes (auto zero-padded)
let germany = lookup_by_numeric("276").unwrap();
assert_eq!(germany.name, "Germany");

HTTP Status Codes

Use case: Categorize responses for metrics and logging with consistent groupings across all your services.

HTTP status code registry with grouping helpers.

use rsfulmen::foundry::http_statuses::{lookup_status, get_reason, is_success, StatusGroup};

let ok = lookup_status(200).unwrap();
assert_eq!(ok.reason, "OK");
assert_eq!(ok.group, StatusGroup::Success);

assert!(is_success(201));
assert!(!is_success(404));

let reason = get_reason(404).unwrap();
assert_eq!(reason, "Not Found");

Exit Codes

Use case: Return meaningful exit codes so monitoring systems can distinguish configuration errors from runtime failures.

Standardized exit codes with categories and signal handling.

use rsfulmen::foundry::exit_codes::{
    lookup_exit_code, is_signal_exit, get_signal_from_exit,
    EXIT_SUCCESS, EXIT_CONFIG_INVALID, ExitCategory,
};

// Use standard constants
std::process::exit(EXIT_SUCCESS);

// Look up exit code metadata
let code = lookup_exit_code(20).unwrap();
assert_eq!(code.name, "EXIT_CONFIG_INVALID");
assert_eq!(code.category, ExitCategory::Configuration);

// Signal detection (128+)
assert!(is_signal_exit(130));  // SIGINT
let signal = get_signal_from_exit(130).unwrap();
assert_eq!(signal, 2);  // SIGINT = 2

Error Handling (error_handling)

Use case: Return structured errors with correlation IDs and severity levels that integrate with your observability stack.

Canonical error envelope that extends Pathfinder's schema with optional telemetry fields (severity, correlation_id, exit_code, etc.). Payloads are JSON serializable and can be validated offline when schema-validation is enabled.

use rsfulmen::error_handling::{ErrorResponse, PathfinderErrorResponse, Severity, WrapOptions};

let base = PathfinderErrorResponse::new("CONFIG_INVALID", "Config load failed");
let err = ErrorResponse::wrap(
    base,
    WrapOptions {
        severity: Some(Severity::High),
        exit_code: Some(20),
        ..WrapOptions::default()
    },
)
.unwrap();

println!("{}", err.to_json_string_pretty().unwrap());

Fulencode (fulencode)

Use case: Encode, decode, detect, and normalize text encodings with security protections against normalization attacks.

Binary-to-text encoding/decoding, encoding detection, Unicode normalization, and BOM handling following the Crucible fulencode standard.

use rsfulmen::fulencode::{self, EncodingFormat, NormalizationProfile};

// Encode/decode
let encoded = fulencode::encode(b"Hello, World!", EncodingFormat::Base64, None).unwrap();
assert_eq!(encoded.data, "SGVsbG8sIFdvcmxkIQ==");
let decoded = fulencode::decode(&encoded.data, EncodingFormat::Base64, None).unwrap();

// Unicode normalization (text-safe rejects zero-width and bidi attacks)
let result = fulencode::normalize("café", NormalizationProfile::Nfc, None).unwrap();

// BOM detection
let bom = fulencode::detect_bom(b"\xef\xbb\xbfHello").unwrap();
assert_eq!(bom.bom_type, Some("utf-8".to_string()));

Correlation IDs (foundry::correlation)

Use case: Generate and validate UUIDv7 correlation IDs for distributed tracing and log correlation.

use rsfulmen::foundry::correlation::{self, CorrelationId};

let id = correlation::generate();           // UUIDv7 string
assert!(correlation::is_valid(&id));        // strictly v7, rejects v4

let typed = CorrelationId::new();           // validated newtype
println!("correlation_id={}", typed);       // lowercase canonical form

Signal Handling (signals)

Use case: Graceful shutdown, config reload on SIGHUP, and double-tap Ctrl+C in CLI tools and services.

Runtime signal manager with ordered cleanup chains, cross-platform support, and test injection.

use rsfulmen::signals::SignalManager;

let mut manager = SignalManager::new();
manager.on_shutdown(|| { println!("cleaning up..."); Ok(()) });
manager.on_reload(|| { println!("reloading config..."); Ok(()) });
manager.enable_double_tap(Default::default());

// Start listener on a dedicated thread
std::thread::spawn(move || manager.listen());

Config Env Overrides (config::env)

Use case: Map environment variables to config keys for 12-factor app compliance.

use rsfulmen::config::env::{self, EnvVarSpec, EnvVarType};

let specs = vec![
    EnvVarSpec {
        name: "APP_PORT".into(),
        path: vec!["server".into(), "port".into()],
        var_type: EnvVarType::Int,
        aliases: vec!["PORT".into()],
    },
];

let report = env::load_env_overrides_with_report(&specs).unwrap();
// report.overrides → feeds into three-layer config
// report.applied → which env vars were used
// report.conflicts → canonical vs alias disagreements (secrets masked)

Telemetry Metrics (telemetry_metrics)

Use case: Emit metrics that conform to your organization's taxonomy without building a custom metrics framework.

Taxonomy-backed counters, gauges, and histograms exported as schema-valid JSON events.

use rsfulmen::telemetry_metrics::Metrics;

let metrics = Metrics::new();
metrics.counter("schema_validations").unwrap().inc(None).unwrap();

let events = metrics.flush().unwrap();
assert!(!events.is_empty());

Installation

Add to your Cargo.toml:

[dependencies]
rsfulmen = "0.1"

Feature Flags

rsfulmen supports minimal installs for lightweight consumers (e.g. sysprims).

[dependencies]
# All features (default)
rsfulmen = "0.1"

# Foundry core only (signals, exit-codes, countries, http-statuses)
rsfulmen = { version = "0.1", default-features = false, features = ["foundry-core"] }

# Add MIME types (adds serde_json)
rsfulmen = { version = "0.1", default-features = false, features = ["foundry-mime-types"] }

# Add patterns (adds regex/glob)
rsfulmen = { version = "0.1", default-features = false, features = ["foundry-patterns"] }

# Similarity (standalone module; heavy)
rsfulmen = { version = "0.1", default-features = false, features = ["similarity"] }

# Schema validation (heavy)
rsfulmen = { version = "0.1", default-features = false, features = ["schema-validation"] }

Feature Matrix

Feature Includes Notes
foundry-core signals, exit-codes, countries, http-statuses Minimal catalog install + signal manager
foundry-mime-types mime-types Adds serde_json
foundry-patterns patterns Adds regex + glob
foundry-correlation UUIDv7 correlation IDs Adds uuid
foundry All foundry submodules Convenience flag
fulencode encode/decode/detect/normalize/BOM Adds base64 + unicode-normalization
similarity rsfulmen::similarity (+ foundry re-export) Heavy deps (strsim/unicode)
schema-validation rsfulmen::schema_validation Heavy deps (jsonschema/url)
error-handling rsfulmen::error_handling Canonical error envelope (adds serde_json)
telemetry-metrics rsfulmen::telemetry_metrics Metrics export (schema-valid JSON events)
crucible rsfulmen::crucible + typed role catalog Embedded SSOT access
docscribe rsfulmen::docscribe Doc access + frontmatter parsing

Development

Prerequisites

  • Rust 1.83+
  • goneat for SSOT sync (installed via make bootstrap)

Quick Start

# Install development tools
make bootstrap

# Sync Crucible assets
make sync

# Run tests
make test

# Run all quality checks
make check-all

Makefile Targets

Target Description
bootstrap Install dependencies and external tools
sync Sync assets from Crucible SSOT
build Build library
test Run all tests
lint Run clippy with strict warnings
fmt Format code with rustfmt
check-all fmt-check + lint + test
doc Generate rustdoc documentation
version Print current version

Crucible Sync

rsfulmen syncs schemas, documentation, and configuration from Crucible:

# Update to latest Crucible
make sync

# Check sync provenance
cat .goneat/ssot/provenance.json

Synced assets are stored in:

  • config/crucible-rs/ — Configuration files and foundry catalogs
  • schemas/crucible-rs/ — JSON schemas
  • docs/crucible-rs/ — Documentation and standards

Ecosystem

rsfulmen is part of the Fulmen helper library family. All libraries derive their catalogs from Crucible, ensuring cross-language consistency:

Library Language Status Crucible Version
gofulmen Go Reference impl v0.4.x
tsfulmen TypeScript Stable v0.4.x
pyfulmen Python Stable v0.4.x
rsfulmen Rust Alpha v0.4.12

Why this matters: A Rust service using EXIT_CONFIG_INVALID (code 20) will match a Go service using the same exit code. Your alerting rules and runbooks work across the entire stack.

All libraries sync from Crucible and follow the Fulmen Helper Library Standard.

Supply Chain & Security

rsfulmen is designed for environments where dependency hygiene matters.

Dependency Transparency:

  • Minimal by default: foundry-core feature has zero heavy dependencies
  • Auditable: Run cargo tree to inspect the full dependency graph
  • SBOM-ready: Compatible with cargo sbom and cargo cyclonedx
  • License-clean: All dependencies use MIT, Apache-2.0, or compatible licenses

Embedded Data:

  • All Crucible catalogs (country codes, exit codes, HTTP statuses) are embedded at compile time
  • No runtime network calls for reference data
  • Version and provenance tracked in .crucible/metadata/metadata.yaml

Security Practices:

  • No unsafe code in core modules
  • Pattern matching uses bounded execution (no ReDoS vulnerabilities)
  • Vulnerability scanning via cargo audit

Audit Commands:

# View dependency tree
cargo tree

# Check for known vulnerabilities
cargo audit

# Generate SBOM
cargo sbom > sbom.json

See SECURITY.md for vulnerability reporting and our full security policy.

Contributing

Contributions are welcome! Please ensure:

  • Code follows Rust idioms and conventions
  • Tests are included for new functionality
  • Documentation is updated
  • Changes are consistent with Crucible standards
  • make check-all passes before submitting

See MAINTAINERS.md for governance and SECURITY.md for vulnerability reporting.

License

Licensed under the MIT License. See LICENSE file for details.

Trademarks: "Fulmen" and "3 Leaps" are trademarks of 3 Leaps, LLC. While code is open source, please use distinct names for derivative works to prevent confusion.

Changelog

See CHANGELOG.md for version history.


Built by the 3 Leaps team

Part of the Fulmen Ecosystem — Enterprise-grade libraries that thrive on scale

Dependencies

~2–16MB
~160K SLoC