# sdk-rust
`sdk-rust` is the canonical Lattix SDK core for the metadata-only `lattix-platform-api` control plane. It owns the HTTP behavior, typed request/response models, and the C ABI consumed by the Go and Python bindings.
The public Lattix docs at `https://lattix.io/docs` intentionally stay focused on platform concepts and operator-facing guidance. Per-language SDK reference material lives with each SDK package, so this README is part of the supported Rust reference surface.
## Installation
Install the published crate from crates.io:
```bash
cargo add sdk-rust
```
Tagged GitHub releases in the public mirror repository
`https://github.com/LATTIX-IO/sdk-rust-public/releases` publish version-matched
native bundles for downstream bindings and non-Cargo consumers:
- `sdk-rust-native-linux-x86_64.tar.gz`
- `sdk-rust-native-macos-x86_64.tar.gz`
- `sdk-rust-native-macos-aarch64.tar.gz`
- `sdk-rust-native-windows-x86_64.zip`
Each archive contains the native library plus `include/lattix_sdk.h`.
## What it exposes
The Rust client currently supports the `/v1/sdk/*` control-plane operations used by embedded enforcement flows:
- `capabilities()`
- `whoami()`
- `bootstrap()`
- `protection_plan(...)`
- `policy_resolve(...)`
- `key_access_plan(...)`
- `artifact_register(...)`
- `evidence(...)`
These operations are intentionally **metadata only**. Applications protect or access content locally; the platform resolves policy, identity, and key-handling plans from metadata.
## Usage
```rust
use sdk_rust::{
ArtifactProfile, Client, ProtectionOperation, ResourceDescriptor, SdkProtectionPlanRequest,
WorkloadDescriptor,
};
fn main() -> Result<(), Box<dyn std::error::Error>> {
let client = Client::builder("https://api.lattix.io")
.with_bearer_token("replace-me")
.with_tenant_id("tenant-a")
.with_user_id("user-a")
.build()?;
let bootstrap = client.bootstrap()?;
println!("bootstrap mode: {}", bootstrap.enforcement_model);
let plan = client.protection_plan(&SdkProtectionPlanRequest {
operation: ProtectionOperation::Protect,
workload: WorkloadDescriptor {
application: "example-app".to_string(),
environment: Some("dev".to_string()),
component: Some("worker".to_string()),
},
resource: ResourceDescriptor {
kind: "document".to_string(),
id: Some("doc-123".to_string()),
mime_type: Some("application/pdf".to_string()),
},
preferred_artifact_profile: Some(ArtifactProfile::Tdf),
content_digest: Some("sha256:example".to_string()),
content_size_bytes: Some(1024),
purpose: Some("store".to_string()),
labels: vec!["confidential".to_string()],
attributes: std::collections::BTreeMap::new(),
})?;
println!("protect locally: {}", plan.execution.protect_locally);
Ok(())
}
```
Run the example with:
```bash
cargo run --example platform_api
```
## Binding expectations
This crate is also the native library consumed by `sdk-go` and `sdk-python`.
- canonical C header: `include/lattix_sdk.h`
- crate outputs: `rlib`, `cdylib`, `staticlib`
- Windows native library: `target/release/sdk_rust.dll`
- macOS native library: `target/release/libsdk_rust.dylib`
- Linux native library: `target/release/libsdk_rust.so`
Downstream bindings should treat `include/lattix_sdk.h` as the ABI source of truth and avoid maintaining hand-edited copies when possible.
### C ABI contract
- all exported functions use UTF-8 JSON payloads and JSON string responses
- strings returned by the library must be released with `lattix_sdk_string_free(...)`
- client handles returned by `lattix_sdk_client_new(...)` must be released with `lattix_sdk_client_free(...)`
- null returns indicate failure; call `lattix_sdk_last_error_message()` for the thread-local error string
## Testing
Run Rust unit tests plus FFI smoke tests with:
```bash
cargo test
```
Build the native artifacts used by downstream bindings with:
```bash
cargo build --release
```
## Local quality gate
Run the local quality gate before committing when you want the same style of
checks that would otherwise burn CI time:
```bash
./precommit.sh
```
On Windows:
```powershell
./precommit.ps1
```
The script applies safe automated fixes first, then runs linting, SAST, secret
scanning, tests, a release build, and finally cleans local build artifacts.
To wire the same checks into local Git commits and pushes:
```bash
./install-hooks.sh
```
or:
```powershell
./install-hooks.ps1
```
The installed `pre-commit` hook runs a faster version of the gate; the
installed `pre-push` hook runs the full gate.
## Release process
Tagged release steps for maintainers are documented in `RELEASING.md`. The
release workflow publishes to crates.io and attaches the version-matched native
archives to the GitHub release.
## License
Distributed under the proprietary Lattix SDK License in `LICENSE`.