🦀
Search...
⌘
K
Table of Contents
0
Introduction
Part I — Foundations
1. The Philosophy — Why Types Beat Tests
Part II — Core Patterns
2. Typed Command Interfaces — Request Determines Response
3. Single-Use Types — Cryptographic Guarantees via Ownership
4. Capability Tokens — Zero-Cost Proof of Authority
5. Protocol State Machines — Type-State for Real Hardware
6. Dimensional Analysis — Making the Compiler Check Your Units
7. Validated Boundaries — Parse, Don't Validate
8. Capability Mixins — Compile-Time Hardware Contracts
9. Phantom Types for Resource Tracking
10. Const Fn — Compile-Time Correctness Proofs
11. Send & Sync — Compile-Time Concurrency Proofs
Part III — Integration & Practice
12. Putting It All Together — A Complete Diagnostic Platform
13. Applied Walkthrough — Type-Safe Redfish Client
14. Applied Walkthrough — Type-Safe Redfish Server
15. Fourteen Tricks from the Trenches
16. Exercises
Part IV — Reference
17. Reference Card
18. Testing Type-Level Guarantees