arche 2.3.0

An opinionated backend foundation for Axum applications, providing batteries-included integrations for cloud services, databases, authentication, middleware, and logging.
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
# arche

**arche** is an opinionated backend foundation crate for building production-ready
applications with **Axum**.

It provides a curated set of building blocks commonly required in modern backend
services—cloud integrations, databases, authentication, middleware, and logging—
so you can focus on business logic instead of repetitive infrastructure wiring.

`arche` is designed to *sit around Axum*, not replace it.

## Why arche?

Most backend services end up re-implementing the same infrastructure concerns:

- Cloud SDK setup and ergonomics
- Database connection management
- Authentication primitives
- Middleware patterns
- Logging and tracing configuration
- Common error handling

**arche** brings these pieces together into a cohesive, Rust-native foundation,
built on top of well-established libraries and SDKs.

## What arche provides

### `aws`

AWS SDK integrations built on official SDKs:

- **S3**: Client initialization with support for IAM roles or environment-based credentials
- **SES**: Email sending with SES, including templated emails
- **KMS**: Key Management Service for encryption/decryption operations

### `gcp`

Google Cloud Platform integrations:

- **Drive**: Google Drive client with service account authentication
- **Sheets**: Google Sheets client with service account authentication

### `database`

Database connection management:

- **Postgres**: Connection pooling with `sqlx`, configurable credentials, health checks
- **Redis**: Connection pooling with `bb8`, async operations, health checks

### `jwt`

JWT utilities for authentication and authorization:

- Token generation and verification (HS256)
- Access/refresh token pair generation
- Token expiry helpers
- Custom claims support

### `csv`

Async CSV processing via a single reusable `CsvClient`:

- **Batch**: `read_all`, `read_file`, `write_all`, `write_file` — load everything at once
- **Streaming**: `reader` / `writer` factories for memory-efficient record-by-record I/O
- Configurable delimiter, quoting, escaping, headers, and more

### `error`

Axum-compatible error handling:

- `AppError` enum with HTTP error variants covering 400, 401, 403, 404, 409, 422, 424, 500, and 503
- Automatic `IntoResponse` conversion with structured JSON bodies
- `InternalError` responses are sanitized by default (no leaked SQL, infra details)
- Optional `verbose-errors` feature flag for dev/staging diagnostics
- `DependencyFailed` variant for upstream service failures (OpenSearch, Shopify, S3, etc.)

### `utils`

Common utilities for backend services:

- Timestamp validation and conversion helpers
- `OffsetDateTime` utilities (Unix, ISO8601)
- Pagination parameter types

All components are modular and explicit—nothing is hidden or magical.

## Module Reference

### AWS (`arche::aws`)

#### S3

Initialize an S3 client with automatic credential management:

```rust
use arche::aws::s3::get_s3_client;

let client = get_s3_client().await;
```

**Environment Variables:**

- `S3_CRED_SOURCE`: `"IAM"` (default) or `"env"` for environment-based credentials
- `S3_ACCESS_KEY_ID`: Required when using `"env"` credential source
- `S3_SECRET_ACCESS_KEY`: Required when using `"env"` credential source

#### KMS

Encrypt and decrypt data using AWS Key Management Service:

```rust
use arche::aws::kms::{get_kms_client, KMSClient};

// Initialize with default region (ap-south-1)
let client = get_kms_client().await;
let kms = KMSClient::new(client);

// Or with a specific region
let kms = KMSClient::new_with_region("us-east-1").await;

// Encrypt data
let plaintext = b"sensitive data";
let ciphertext = kms.encrypt("alias/my-key", plaintext).await?;

// Decrypt data
let decrypted = kms.decrypt(&ciphertext).await?;
```

**Credentials:** Uses IAM role credentials by default (recommended for EC2/ECS/Lambda).

### GCP (`arche::gcp`)

#### Drive

```rust
use arche::gcp::drive::get_drive_client;

let drive = get_drive_client().await?;
```

**Environment Variables:**

- `GCP_DRIVE_KEY`: Path to service account JSON key file

#### Sheets

```rust
use arche::gcp::sheets::get_sheets_client;

let sheets = get_sheets_client().await?;
```

**Environment Variables:**

- `GCP_SHEETS_KEY`: Path to service account JSON key file

### Database (`arche::database`)

#### Postgres

```rust
use arche::database::pg::{get_pg_pool, test_pg};

let pool = get_pg_pool().await;
let is_healthy = test_pg(pool.clone()).await;
```

**Environment Variables:**

- `PG_HOST`: Database host
- `PG_PORT`: Database port
- `PG_DATABASE`: Database name
- `PG_MAX_CONN`: Maximum connections in pool
- `PG_CREDENTIALS`: JSON string with `username` and `password` (alternative)
- `PG_USERNAME`: Username (if not using `PG_CREDENTIALS`)
- `PG_PASSWORD`: Password (if not using `PG_CREDENTIALS`)

#### Redis

```rust
use arche::database::redis::{get_redis_pool, test_redis};

let pool = get_redis_pool().await;
let is_healthy = test_redis(pool.clone()).await;
```

**Environment Variables:**

- `REDIS_HOST`: Redis host
- `REDIS_PORT`: Redis port
- `REDIS_MAX_CONN`: Maximum connections in pool

### JWT (`arche::jwt`)

```rust
use arche::jwt::{generate_tokens, verify_token, generate_expiry_time};
use serde::{Serialize, Deserialize};

#[derive(Serialize, Deserialize)]
struct Claims {
    sub: String,
    exp: usize,
}

// Generate tokens
let access_claims = Claims { sub: "user_id".into(), exp: generate_expiry_time(3600) };
let refresh_claims = Claims { sub: "user_id".into(), exp: generate_expiry_time(86400) };

let tokens = generate_tokens(
    access_claims,
    refresh_claims,
    &access_secret,
    &refresh_secret,
);

// Verify token
let token_data = verify_token::<Claims>(&token, secret, Some("audience".into()))?;
```

### CSV (`arche::csv`)

Async CSV processing powered by `csv-async`. Create one `CsvClient`, reuse it everywhere:

```rust
use arche::csv::CsvClient;
use serde::{Deserialize, Serialize};

#[derive(Deserialize)]
struct Record {
    name: String,
    age: u32,
    city: String,
}

// Default config (comma-delimited, with headers)
let csv = CsvClient::new();

// Or customize
let csv = CsvClient::new()
    .delimiter(b';')
    .has_headers(true)
    .flexible(true);
```

#### Batch reading

```rust
// From bytes
let data = b"name,age,city\nAlice,30,NYC\nBob,25,LA";
let records: Vec<Record> = csv.read_all(data.as_slice()).await?;

// From a file
let records: Vec<Record> = csv.read_file("data.csv").await?;

// Raw string records (no serde)
let raw_records = csv.read_records(data.as_slice()).await?;
```

#### Batch writing

```rust
#[derive(Serialize)]
struct Output {
    name: String,
    score: f64,
}

let records = vec![
    Output { name: "Alice".into(), score: 95.5 },
    Output { name: "Bob".into(), score: 87.0 },
];

// Write to in-memory bytes
let bytes: Vec<u8> = csv.write_all(&records).await?;

// Write to a file
csv.write_file("output.csv", &records).await?;
```

#### Streaming (memory-efficient)

```rust
// Record-by-record reading
let mut stream = csv.reader_from_file("large.csv").await?;
while let Some(result) = stream.next_deserialized::<Record>().await {
    let record = result?;
    // process one record at a time
}

// Record-by-record writing
let mut writer = csv.writer_to_file("output.csv").await?;
writer.serialize(&Output { name: "Alice".into(), score: 95.5 }).await?;
writer.write_fields(["Bob", "87.0"]).await?;
writer.finish().await?;
```

### Error (`arche::error`)

```rust
use arche::error::AppError;
use axum::response::IntoResponse;

async fn handler() -> Result<impl IntoResponse, AppError> {
    Err(AppError::Unauthorized)
}

// 400 — bad request with details
let error = AppError::bad_request(
    Some(errors_map),
    Some("Invalid input".into()),
    Some("Field validation failed".into()),
);

// 404 — resource not found
let error = AppError::not_found("client");

// 409 — unique constraint violation
let error = AppError::conflict("A client with this name already exists");

// 424 — upstream dependency failed (retryable)
let error = AppError::dependency_failed("opensearch", "index timeout");

// 424 — upstream dependency failed (permanent)
let error = AppError::dependency_failed_permanent("shopify", "invalid API key");

// 500 — internal error (response body is sanitized by default)
let error = AppError::internal_error("SQL error: ...".into(), None);
```

**Error Variants:**

| Variant | Status | Constructor |
|---|---|---|
| `BadRequest` | 400 | `bad_request(errors, message, description)` |
| `Unauthorized` | 401 | Direct construction |
| `Forbidden` | 403 | Direct construction |
| `NotFound` | 404 | `not_found(resource)` |
| `Conflict` | 409 | `conflict(message)` |
| `UnprocessableEntity` | 422 | `unprocessable_entity(errors, message, description)` |
| `DependencyFailed` | 424 | `dependency_failed(upstream, detail)` |
| `InternalError` | 500 | `internal_error(error, message)` |
| `Unavailable` | 503 | Direct construction |

**Feature Flags:**

- `verbose-errors` — When enabled, `InternalError` returns the raw error string to the client instead of a sanitized message. Intended for dev/staging only.

```toml
# In your Cargo.toml (dev/staging only)
arche = { version = "2.2.0", features = ["verbose-errors"] }
```

### Utils (`arche::utils`)

```rust
use arche::utils::{validate_timestamp, FromOffsetDateTime, PaginationParams};
use sqlx::types::time::OffsetDateTime;

// Timestamp validation
let is_future = validate_timestamp(timestamp, false);

// DateTime conversion
let iso_string = offset_dt.to_iso_string()?;

// Pagination
let params = PaginationParams {
    page_number: Some(1),
    page_size: Some(20),
};
```

## What arche is *not*

- ❌ A framework that replaces Axum
- ❌ A code generator or project template
- ❌ A monolithic abstraction over third-party libraries
- ❌ A "do-everything" utils crate

`arche` favors composition over abstraction.

## Design principles

- **Explicit over implicit**
- **Composition over inheritance**
- **Thin wrappers over official SDKs**
- **Production-first defaults**
- **No global state**
- **Async-first**

## Why arche?

Most backend services end up re-implementing the same infrastructure concerns:

- Cloud SDK setup and ergonomics
- Database connection management
- Authentication primitives
- Middleware patterns
- Logging and tracing configuration
- Common error handling

**arche** brings these pieces together into a cohesive, Rust-native foundation,
built on top of well-established libraries and SDKs.

---

## What arche provides

### `aws`
AWS SDK integrations built on official SDKs:
- **S3**: Client initialization with support for IAM roles or environment-based credentials
- **SES**: Email sending with SES, including templated emails
- **KMS**: Key Management Service for encryption/decryption operations

### `gcp`
Google Cloud Platform integrations:
- **Drive**: Google Drive client with service account authentication
- **Sheets**: Google Sheets client with service account authentication

### `database`
Database connection management:
- **Postgres**: Connection pooling with `sqlx`, configurable credentials, health checks
- **Redis**: Connection pooling with `bb8`, async operations, health checks

### `jwt`
JWT utilities for authentication and authorization:
- Token generation and verification (HS256)
- Access/refresh token pair generation
- Token expiry helpers
- Custom claims support

### `csv`
Async CSV processing via a single reusable `CsvClient`:
- **Batch**: `read_all`, `read_file`, `write_all`, `write_file` — load everything at once
- **Streaming**: `reader` / `writer` factories for memory-efficient record-by-record I/O
- Configurable delimiter, quoting, escaping, headers, and more

### `error`
Axum-compatible error handling:
- `AppError` enum with common HTTP error variants
- Automatic `IntoResponse` conversion
- Structured error responses with details

### `utils`
Common utilities for backend services:
- Timestamp validation and conversion helpers
- `OffsetDateTime` utilities (Unix, ISO8601)
- Pagination parameter types

All components are modular and explicit—nothing is hidden or magical.

---

## Module Reference

### AWS (`arche::aws`)

#### S3
Initialize an S3 client with automatic credential management:
```rust
use arche::aws::s3::get_s3_client;

let client = get_s3_client().await;
```

**Environment Variables:**
- `S3_CRED_SOURCE`: `"IAM"` (default) or `"env"` for environment-based credentials
- `S3_ACCESS_KEY_ID`: Required when using `"env"` credential source
- `S3_SECRET_ACCESS_KEY`: Required when using `"env"` credential source

#### KMS
Encrypt and decrypt data using AWS Key Management Service:

```rust
use arche::aws::kms::{get_kms_client, KMSClient};

// Initialize with default region (ap-south-1)
let client = get_kms_client().await;
let kms = KMSClient::new(client);

// Or with a specific region
let kms = KMSClient::new_with_region("us-east-1").await;

// Encrypt data
let plaintext = b"sensitive data";
let ciphertext = kms.encrypt("alias/my-key", plaintext).await?;

// Decrypt data
let decrypted = kms.decrypt(&ciphertext).await?;
```

**Credentials:** Uses IAM role credentials by default (recommended for EC2/ECS/Lambda).

---

### GCP (`arche::gcp`)

#### Drive
```rust
use arche::gcp::drive::get_drive_client;

let drive = get_drive_client().await?;
```

**Environment Variables:**
- `GCP_DRIVE_KEY`: Path to service account JSON key file

#### Sheets
```rust
use arche::gcp::sheets::get_sheets_client;

let sheets = get_sheets_client().await?;
```

**Environment Variables:**
- `GCP_SHEETS_KEY`: Path to service account JSON key file

---

### Database (`arche::database`)

#### Postgres
```rust
use arche::database::pg::{get_pg_pool, test_pg};

let pool = get_pg_pool().await;
let is_healthy = test_pg(pool.clone()).await;
```

**Environment Variables:**
- `PG_HOST`: Database host
- `PG_PORT`: Database port
- `PG_DATABASE`: Database name
- `PG_MAX_CONN`: Maximum connections in pool
- `PG_CREDENTIALS`: JSON string with `username` and `password` (alternative)
- `PG_USERNAME`: Username (if not using `PG_CREDENTIALS`)
- `PG_PASSWORD`: Password (if not using `PG_CREDENTIALS`)

#### Redis
```rust
use arche::database::redis::{get_redis_pool, test_redis};

let pool = get_redis_pool().await;
let is_healthy = test_redis(pool.clone()).await;
```

**Environment Variables:**
- `REDIS_HOST`: Redis host
- `REDIS_PORT`: Redis port
- `REDIS_MAX_CONN`: Maximum connections in pool

---

### JWT (`arche::jwt`)

```rust
use arche::jwt::{generate_tokens, verify_token, generate_expiry_time};
use serde::{Serialize, Deserialize};

#[derive(Serialize, Deserialize)]
struct Claims {
    sub: String,
    exp: usize,
}

// Generate tokens
let access_claims = Claims { sub: "user_id".into(), exp: generate_expiry_time(3600) };
let refresh_claims = Claims { sub: "user_id".into(), exp: generate_expiry_time(86400) };

let tokens = generate_tokens(
    access_claims,
    refresh_claims,
    &access_secret,
    &refresh_secret,
);

// Verify token
let token_data = verify_token::<Claims>(&token, secret, Some("audience".into()))?;
```

---

### CSV (`arche::csv`)

Async CSV processing powered by `csv-async`. Create one `CsvClient`, reuse it everywhere:

```rust
use arche::csv::CsvClient;
use serde::{Deserialize, Serialize};

#[derive(Deserialize)]
struct Record {
    name: String,
    age: u32,
    city: String,
}

// Default config (comma-delimited, with headers)
let csv = CsvClient::new();

// Or customize
let csv = CsvClient::new()
    .delimiter(b';')
    .has_headers(true)
    .flexible(true);
```

#### Batch reading

```rust
// From bytes
let data = b”name,age,city\nAlice,30,NYC\nBob,25,LA”;
let records: Vec<Record> = csv.read_all(data.as_slice()).await?;

// From a file
let records: Vec<Record> = csv.read_file(“data.csv”).await?;

// Raw string records (no serde)
let raw_records = csv.read_records(data.as_slice()).await?;
```

#### Batch writing

```rust
#[derive(Serialize)]
struct Output {
    name: String,
    score: f64,
}

let records = vec![
    Output { name: “Alice”.into(), score: 95.5 },
    Output { name: “Bob”.into(), score: 87.0 },
];

// Write to in-memory bytes
let bytes: Vec<u8> = csv.write_all(&records).await?;

// Write to a file
csv.write_file(“output.csv”, &records).await?;
```

#### Streaming (memory-efficient)

```rust
// Record-by-record reading
let mut stream = csv.reader_from_file(“large.csv”).await?;
while let Some(result) = stream.next_deserialized::<Record>().await {
    let record = result?;
    // process one record at a time
}

// Record-by-record writing
let mut writer = csv.writer_to_file(“output.csv”).await?;
writer.serialize(&Output { name: “Alice”.into(), score: 95.5 }).await?;
writer.write_fields([“Bob”, “87.0”]).await?;
writer.finish().await?;
```