High-performance Python web framework — faster alternative to FastAPI
Project description
High-performance Python web framework.
Built from scratch on msgspec and a custom ASGI layer. No Starlette, no Pydantic (by default), no compromises on speed.
from hawkapi import HawkAPI
app = HawkAPI()
@app.get("/")
async def hello():
return {"message": "Hello, World!"}
hawkapi dev app:app
Performance
HawkAPI leads 5 of 6 head-to-head scenarios against the top Python web frameworks (measured 2026-04-17, full breakdown in benchmarks/competitive/RESULTS.md):
| Scenario | HawkAPI | FastAPI | Litestar | BlackSheep | Starlette | Sanic |
|---|---|---|---|---|---|---|
body_validation |
82,202 🏆 | 23,628 | 31,290 | 46,418 | 49,247 | 34,978 |
json |
126,820 🏆 | 44,852 | 55,507 | 125,503 | 92,766 | 51,110 |
path_param |
144,704 🏆 | 33,436 | 49,928 | 114,354 | 84,670 | 51,258 |
plaintext |
148,103 | 44,276 | 56,580 | 165,151 🏆 | 106,698 | 55,624 |
query_params |
90,221 🏆 | 25,710 | 48,828 | 74,526 | 63,832 | 42,798 |
routing_stress |
134,356 🏆 | 17,123 | 56,085 | 121,214 | 27,397 | 42,801 |
Requests/second on a shared ubuntu-latest runner with Granian (1 worker, ASGI),
wrk 4 threads × 64 connections × 10 seconds. Fresh numbers auto-regenerate every
Monday via the Competitive benchmarks workflow.
Reproduction: benchmarks/competitive/README.md.
Installation
pip install hawkapi
With extras:
pip install hawkapi[uvicorn] # ASGI server
pip install hawkapi[pydantic] # Optional Pydantic v2 support
pip install hawkapi[granian] # Granian ASGI server
pip install hawkapi[otel] # OpenTelemetry tracing
pip install hawkapi[all] # Everything
Requirements: Python 3.12+ and msgspec >= 0.19.0.
Quick Start
import msgspec
from typing import Annotated
from hawkapi import HawkAPI
app = HawkAPI()
class CreateUser(msgspec.Struct):
name: str
email: str
age: Annotated[int, msgspec.Meta(ge=0, le=150)]
class UserResponse(msgspec.Struct):
id: int
name: str
email: str
@app.post("/users", status_code=201)
async def create_user(body: CreateUser) -> UserResponse:
return UserResponse(id=1, name=body.name, email=body.email)
Type annotations drive validation, serialization, and OpenAPI schema generation. Invalid requests return RFC 9457 Problem Details:
{
"type": "https://hawkapi.ashimov.com/errors/validation",
"title": "Validation Error",
"status": 400,
"detail": "1 validation error",
"errors": [
{"field": "age", "message": "Expected `int` >= 0", "value": -5}
]
}
Core Features
Routing
Radix tree router with typed path parameters (str, int, float, uuid), query parameter coercion, and ~500ns lookups:
import uuid
@app.get("/users/{user_id:int}")
async def get_user(user_id: int):
return {"id": user_id}
@app.get("/items/{item_id:uuid}")
async def get_item(item_id: uuid.UUID):
return {"id": str(item_id)}
@app.get("/search")
async def search(q: str, limit: int = 10):
return {"query": q, "limit": limit}
Both def and async def handlers work. Sync handlers run in a threadpool automatically.
Parameter Markers
Fine-tune parameter sources with Body, Query, Header, Cookie, and Path:
from typing import Annotated
from hawkapi import Query, Header
@app.get("/items")
async def list_items(
q: Annotated[str, Query(alias="search")],
x_token: Annotated[str, Header()],
limit: Annotated[int, Query(ge=1, le=100)] = 20,
):
return {"query": q, "token": x_token, "limit": limit}
Dependency Injection
Full-featured DI container with three lifecycles — works in routes, background tasks, CLI commands, and tests:
from hawkapi import HawkAPI, Container, Depends
container = Container()
container.singleton(Database, factory=lambda: Database(url=DB_URL))
container.scoped(Session, factory=lambda db=Depends(Database): db.session())
app = HawkAPI(container=container)
@app.get("/users/{user_id}")
async def get_user(user_id: int, session: Session):
return await session.get(User, user_id)
| Lifecycle | Behavior |
|---|---|
singleton |
Created once, shared globally |
scoped |
Created once per request |
transient |
Created fresh every injection |
Generator dependencies with yield manage resource lifecycles — cleanup code runs after the handler completes, even on exceptions:
async def get_db():
db = await create_connection()
try:
yield db
finally:
await db.close()
@app.get("/users")
async def list_users(db: Annotated[Connection, Depends(get_db)]):
return await db.fetch_all("SELECT * FROM users")
DI Introspection
Inspect the container at runtime or export a Mermaid dependency graph:
from hawkapi.di.introspection import container_graph, to_mermaid
print(container_graph(container)) # JSON-serializable dict of all providers
print(to_mermaid(container)) # Mermaid graph TD diagram
OpenAPI Documentation
OpenAPI 3.1 schema auto-generated from type annotations:
| URL | UI |
|---|---|
/docs |
Swagger UI |
/redoc |
ReDoc |
/scalar |
Scalar |
/openapi.json |
Raw JSON schema |
All security schemes appear in the Authorize button automatically. Disable with app = HawkAPI(docs_url=None, openapi_url=None).
Response Model
Filter and validate responses — hide internal fields from API output:
class UserFull(msgspec.Struct):
id: int
name: str
email: str
password_hash: str # Internal field
class UserOut(msgspec.Struct):
id: int
name: str
email: str
@app.get("/users/{user_id}", response_model=UserOut)
async def get_user(user_id: int):
# password_hash is automatically filtered out
return await db.get_user(user_id)
Works with both msgspec Structs and Pydantic models.
Pagination
Built-in offset and cursor pagination helpers:
from hawkapi import Page, PaginationParams, CursorPage, CursorParams
@app.get("/users")
async def list_users(params: PaginationParams) -> Page[UserOut]:
users, total = await db.get_users(offset=params.offset, limit=params.limit)
return Page(items=users, total=total, page=params.page, size=params.limit)
@app.get("/feed")
async def feed(params: CursorParams) -> CursorPage[PostOut]:
posts, next_cursor = await db.get_feed(after=params.after, limit=params.limit)
return CursorPage(items=posts, next_cursor=next_cursor)
Middleware
from hawkapi import Middleware, Request, Response
class AuthMiddleware(Middleware):
async def before_request(self, request: Request) -> Request | Response:
token = request.headers.get("authorization")
if not token:
return Response(status_code=401)
request.state.user = verify_token(token)
return request
Built-in Middleware
| Middleware | Description |
|---|---|
CORSMiddleware |
Cross-Origin Resource Sharing |
GZipMiddleware |
Response compression (streaming-aware) |
TimingMiddleware |
Server-Timing header |
TrustedHostMiddleware |
Host header validation |
TrustedProxyMiddleware |
X-Forwarded-For/Proto/Host from trusted CIDRs |
SecurityHeadersMiddleware |
X-Content-Type-Options, X-Frame-Options, etc. |
RequestIDMiddleware |
X-Request-ID header (generates UUID4 if missing) |
HTTPSRedirectMiddleware |
Redirect HTTP to HTTPS |
RateLimitMiddleware |
Token bucket rate limiting (429 + Retry-After) |
RedisRateLimitMiddleware |
Redis-backed token bucket rate limiting (distributed) |
RequestLimitsMiddleware |
Max query string / header size enforcement |
CircuitBreakerMiddleware |
Three-state circuit breaker (per-path tracking) |
CSRFMiddleware |
Double-submit cookie CSRF protection |
SessionMiddleware |
Signed cookie-based session management |
ErrorHandlerMiddleware |
Structured error handling pipeline |
PrometheusMiddleware |
Prometheus-compatible /metrics endpoint |
StructuredLoggingMiddleware |
JSON request/response logs |
DebugMiddleware |
/_debug/routes and /_debug/stats endpoints |
ObservabilityMiddleware |
All-in-one tracing, structured logs, metrics |
Middleware is registered globally via app.add_middleware(). Each entry is stored as a MiddlewareEntry dataclass holding the middleware class and its kwargs, then compiled into an onion-model pipeline at startup.
Security
from hawkapi import HTTPBearer, Depends
auth = HTTPBearer()
@app.get("/protected")
async def protected(credentials=Depends(auth)):
return {"token": credentials.credentials}
Built-in schemes: HTTPBearer, HTTPBasic, APIKeyHeader, APIKeyQuery, APIKeyCookie, OAuth2PasswordBearer.
Declarative Permissions (RBAC)
from hawkapi.security import PermissionPolicy
app.permission_policy = PermissionPolicy(
resolver=get_user_permissions,
mode="all", # "all" = require all listed, "any" = require at least one
)
@app.get("/admin", permissions=["admin:read"])
async def admin_panel():
return {"secret": "data"}
Responses
from hawkapi import (
JSONResponse, HTMLResponse, PlainTextResponse,
RedirectResponse, StreamingResponse, FileResponse,
EventSourceResponse, ServerSentEvent,
)
# Server-Sent Events
async def events():
yield ServerSentEvent(data="connected", event="open")
yield ServerSentEvent(data='{"temp": 22.5}', event="reading")
return EventSourceResponse(events())
MessagePack Content Negotiation
HawkAPI supports automatic content negotiation via the Accept header. Clients requesting application/msgpack or application/x-msgpack receive MessagePack-encoded responses instead of JSON:
from hawkapi.serialization.negotiation import negotiate_content_type, encode_for_content_type
# Automatic: clients send Accept: application/msgpack
# curl -H "Accept: application/msgpack" http://localhost:8000/data
# Manual usage in custom responses:
content_type = negotiate_content_type(request.headers.get("accept"))
body = encode_for_content_type(data, content_type)
Both JSON and MessagePack encoders share the same enc_hook fallback for datetime, UUID, set, and bytes types.
WebSocket
from hawkapi import WebSocket
@app.websocket("/ws")
async def websocket_handler(ws: WebSocket):
await ws.accept()
async for message in ws:
await ws.send_text(f"Echo: {message}")
HTTPException
Raise HTTP errors from anywhere with custom status, detail, and headers:
from hawkapi import HTTPException
@app.get("/items/{item_id:int}")
async def get_item(item_id: int):
item = await db.get(item_id)
if item is None:
raise HTTPException(404, detail="Item not found")
return item
@app.get("/admin")
async def admin():
raise HTTPException(
401,
detail="Token expired",
headers={"WWW-Authenticate": "Bearer"},
)
Custom Exception Handlers
@app.exception_handler(ValueError)
async def handle_value_error(request, exc):
return Response(
content=b'{"error": "bad value"}',
status_code=400,
content_type="application/json",
)
Background Tasks
from hawkapi import BackgroundTasks
@app.post("/notify")
async def notify(tasks: BackgroundTasks):
tasks.add_task(send_email, to="user@example.com", subject="Hello")
return {"status": "queued"}
Lifecycle Hooks
@app.on_startup
async def startup():
await db.connect()
@app.on_shutdown
async def shutdown():
await db.disconnect()
Body Size Limits
app = HawkAPI(max_body_size=1024 * 1024) # 1 MB (default: 10 MB)
# Returns 413 Payload Too Large when exceeded
Streaming Request Body
Stream the request body in chunks without buffering the entire payload in memory. Useful for large file uploads:
@app.post("/upload")
async def upload(request: Request):
total = 0
async for chunk in request.stream():
total += len(chunk)
await process_chunk(chunk)
return {"bytes_received": total}
Respects max_body_size and raises RequestEntityTooLarge if exceeded. Once streamed, calling request.body() raises RuntimeError; if body() was called first, stream() yields the cached body as a single chunk.
Routers and Controllers
from hawkapi import Router
api = Router(prefix="/api/v1", tags=["api"])
@api.get("/health")
async def health():
return {"status": "ok"}
app.include_router(api)
Class-based controllers:
from hawkapi import Controller, get, post
class UserController(Controller):
prefix = "/users"
tags = ["users"]
@get("/")
async def list_users(self):
return []
@post("/")
async def create_user(self, body: CreateUser):
return {"id": 1}
app.include_controller(UserController)
Per-Route Middleware
Apply middleware to individual routes instead of the entire app. Pass a middleware= list of middleware classes (or (class, kwargs) tuples) to any route decorator:
from hawkapi.middleware.rate_limit import RateLimitMiddleware
@app.get("/public", middleware=[RateLimitMiddleware])
async def public():
return {"data": "rate-limited route"}
@app.post("/upload", middleware=[(RateLimitMiddleware, {"requests_per_second": 2.0})])
async def upload(body: UploadBody):
return {"status": "ok"}
Static Files
from hawkapi import StaticFiles
app.mount("/static", StaticFiles(directory="static"))
app.mount("/site", StaticFiles(directory="public", html=True))
Production Features
Health Probes
Built-in Kubernetes-ready health endpoints:
app = HawkAPI(readyz_url="/readyz", livez_url="/livez")
@app.readiness_check("database")
async def check_db():
return await db.ping()
/livez always returns 200. /readyz runs all registered checks and returns 200 or 503 with aggregated results.
Circuit Breaker
from hawkapi.middleware.circuit_breaker import CircuitBreakerMiddleware
app.add_middleware(
CircuitBreakerMiddleware,
failure_threshold=5,
recovery_timeout=30.0,
half_open_max_calls=2,
)
Three-state circuit breaker (CLOSED → OPEN → HALF_OPEN) with per-path tracking. Returns 503 with application/problem+json when the circuit is open.
Trusted Proxy
from hawkapi.middleware.trusted_proxy import TrustedProxyMiddleware
app.add_middleware(
TrustedProxyMiddleware,
trusted_proxies=["10.0.0.0/8", "172.16.0.0/12"],
)
Extracts real client IP, scheme, and host from X-Forwarded-For, X-Forwarded-Proto, X-Forwarded-Host — only from trusted CIDR ranges.
Request Limits
from hawkapi.middleware.request_limits import RequestLimitsMiddleware
app.add_middleware(
RequestLimitsMiddleware,
max_query_length=2048,
max_headers_count=100,
max_header_size=8192,
)
Rejects oversized requests at the ASGI scope level before body parsing. Returns 414 (query) or 431 (headers).
CSRF Protection
Double-submit cookie CSRF protection. Safe methods (GET, HEAD, OPTIONS) pass through and receive a signed CSRF token cookie. Unsafe methods require the token in an X-CSRF-Token header or csrf_token form field:
from hawkapi.middleware.csrf import CSRFMiddleware
app.add_middleware(
CSRFMiddleware,
secret="your-secret-key",
cookie_name="csrftoken",
header_name="x-csrf-token",
cookie_secure=True,
cookie_samesite="lax",
)
Returns 403 with application/problem+json when the token is missing or mismatched. Tokens are HMAC-SHA256 signed and verified with hmac.compare_digest for timing safety.
Session Middleware
Signed cookie-based sessions using HMAC-SHA256. Session data is serialized with msgspec, base64url-encoded, and stored in a cookie with expiry checking:
from hawkapi.middleware.session import SessionMiddleware
app.add_middleware(
SessionMiddleware,
secret_key="your-secret-key",
session_cookie="session",
max_age=14 * 24 * 3600, # 14 days
)
@app.get("/dashboard")
async def dashboard(request: Request):
request.scope["session"]["views"] = request.scope["session"].get("views", 0) + 1
return {"views": request.scope["session"]["views"]}
The cookie is only set when session data changes (dirty checking via snapshot comparison).
Redis Rate Limiter
Distributed rate limiting backed by Redis using an atomic Lua-scripted token bucket. Survives restarts and works across multiple processes:
from hawkapi.middleware.rate_limit_redis import RedisRateLimitMiddleware
app.add_middleware(
RedisRateLimitMiddleware,
redis_url="redis://localhost:6379",
requests_per_second=10.0,
burst=20,
key_prefix="hawkapi:rl:",
)
Falls back to in-memory rate limiting automatically when Redis is unavailable. Supports custom key functions for per-user or per-API-key limits.
Deprecation Headers
Mark routes as deprecated with RFC 8594 Sunset headers:
@app.get("/v1/users", deprecated=True, sunset="2025-06-01", deprecation_link="https://docs.example.com/migration")
async def old_users():
return []
Adds Deprecation: true, Sunset, and Link headers to responses automatically.
Observability
app = HawkAPI(observability=True)
Every request gets: request ID, structured JSON logs, metrics, and OpenTelemetry spans (if installed).
W3C Trace Context
HawkAPI implements W3C Trace Context propagation. Incoming traceparent and tracestate headers are parsed, validated, and propagated to responses. When OpenTelemetry is installed, it delegates to the OTel propagation API; otherwise it uses a built-in manual parser:
from hawkapi.observability.tracing import extract_context, inject_context
# Extract trace context from incoming request headers
ctx = extract_context(scope["headers"])
# ctx = {"trace_id": "4bf9...", "span_id": "00f0...", "trace_flags": "01", "tracestate": ""}
# Inject trace context into outgoing response headers
headers = inject_context(headers, ctx["trace_id"], ctx["span_id"])
If no valid traceparent is present, new trace and span IDs are generated automatically.
Serverless Mode
app = HawkAPI(serverless=True)
Disables documentation routes to minimize cold start. Combined with lazy imports, heavy modules load only on first use.
API Versioning
@app.get("/users", version="v1")
async def list_users_v1():
return [{"id": 1, "name": "Alice"}]
@app.get("/users", version="v2")
async def list_users_v2():
return [{"id": 1, "name": "Alice", "email": "alice@example.com"}]
# GET /v1/users -> v1 handler
# GET /v2/users -> v2 handler
Use VersionRouter to scope an entire router to a version:
from hawkapi.routing import VersionRouter
v2 = VersionRouter("v2", prefix="/api")
@v2.get("/users")
async def list_users(): # -> /v2/api/users
return []
app.include_router(v2)
API Governance
Breaking Changes Detection
Compare two OpenAPI specs and detect breaking changes:
from hawkapi.openapi import detect_breaking_changes, format_report
old_spec = app.openapi(api_version="v1")
# ... make changes ...
new_spec = app.openapi(api_version="v1")
changes = detect_breaking_changes(old_spec, new_spec)
print(format_report(changes))
Detects: path removed, method removed, required parameter added, parameter removed, parameter type changed, response field removed, status code changed.
OpenAPI Linter
from hawkapi.openapi.linter import lint, format_lint_report
issues = lint(app.openapi())
print(format_lint_report(issues))
Built-in rules: operation-id-required, operation-summary-required, response-description-required. Custom rules are simple functions.
Changelog Generator
from hawkapi.openapi import detect_breaking_changes
from hawkapi.openapi.changelog import generate_changelog
changes = detect_breaking_changes(old_spec, new_spec)
print(generate_changelog(changes))
Contract Smoke Tests
Auto-generate test cases from your OpenAPI schema:
from hawkapi.testing.contract import generate_contract_tests
tests = generate_contract_tests(app)
for t in tests:
response = client.request(t.method, t.path)
assert response.status_code == t.expected_status
Plugin API
Extend HawkAPI behavior with plugins. The Plugin base class provides six hooks:
| Hook | When it fires |
|---|---|
on_route_registered(route) |
A route is registered; return the (possibly modified) route |
on_schema_generated(spec) |
OpenAPI schema is generated; return the enriched spec |
on_startup() |
Application startup |
on_shutdown() |
Application shutdown |
on_exception(request, exc) |
Unhandled exception, before the exception handler chain |
on_middleware_added(middleware_class, kwargs) |
A middleware is added to the application |
from hawkapi.plugins import Plugin
class AuditPlugin(Plugin):
def on_route_registered(self, route):
print(f"Route registered: {route.path}")
return route
def on_schema_generated(self, spec):
spec["info"]["x-audited"] = True
return spec
def on_startup(self):
print("App starting up")
def on_exception(self, request, exc):
log_to_sentry(exc)
app.add_plugin(AuditPlugin())
CLI
# Development server with auto-reload
hawkapi dev app:app
hawkapi dev app:app --host 0.0.0.0 --port 3000
# Detect API breaking changes
hawkapi diff app:app --base openapi-v1.json
# Lint OpenAPI spec
hawkapi check app:app
# Generate API changelog
hawkapi changelog app:app --base openapi-v1.json
# Scaffold a new project
hawkapi new myproject
hawkapi new myproject --docker
# Initialize config files in current directory
hawkapi init
hawkapi init creates .env and .env.example files with commented-out HawkAPI configuration templates. Existing files are skipped.
Configuration
from hawkapi import Settings, env_field
class AppSettings(Settings):
db_url: str = env_field("DATABASE_URL")
debug: bool = env_field("DEBUG", default=False)
port: int = env_field("PORT", default=8000)
allowed_hosts: list = env_field("ALLOWED_HOSTS", default=["*"])
settings = AppSettings.load(profile="production")
Supports .env files and environment profiles (.env.development, .env.production).
Testing
Sync TestClient for pytest — no async needed:
from hawkapi.testing import TestClient, override
client = TestClient(app)
def test_hello():
response = client.get("/")
assert response.status_code == 200
assert response.json()["message"] == "Hello, World!"
def test_with_mock_db():
with override(app, Database, mock_db):
response = client.get("/users/1")
assert response.status_code == 200
Cookie Jar
TestClient maintains a persistent cookie jar across requests. Set-Cookie headers from responses are automatically stored and sent on subsequent requests:
client = TestClient(app)
client.cookies["session"] = "abc123" # Pre-set cookies
response = client.get("/dashboard") # Cookie sent automatically
# Response Set-Cookie headers update the jar for future requests
Assertion Helpers
TestResponse provides convenience properties for assertions:
response = client.get("/users")
assert response.is_success # 2xx status
assert not response.is_redirect # 3xx status
response.raise_for_status() # Raises HTTPStatusError for 4xx/5xx
assert response.text == "OK" # Body as UTF-8 string
assert "Content-Type" in response.headers # Case-insensitive header lookup
Response headers use CaseInsensitiveDict — lookups like response.headers["content-type"] and response.headers["Content-Type"] both work.
Benchmarks
Tested on Apple M3 Pro, Python 3.13, msgspec 0.20. ASGI-level benchmarks (no HTTP server overhead — pure framework performance).
Request/Response
| Scenario | Latency | Throughput |
|---|---|---|
Simple JSON (GET /ping) |
35 us | ~28,500 req/s |
Path param (GET /users/42) |
39 us | ~25,600 req/s |
Body decode (POST /items) |
40 us | ~25,000 req/s |
| Large response (100 items) | 57 us | ~17,500 req/s |
Serialization
| Payload | Ops/sec | vs stdlib json |
|---|---|---|
| Small dict (56 bytes) | 13.0M | 12.2x |
| 100-item list (8.1 KB) | 189K | 6.0x |
| 1000-item list (198 KB) | 8.7K | 6.1x |
Radix Tree Routing
Radix tree with 48 registered routes:
| Metric | Value |
|---|---|
| Lookups/sec | ~2,000,000 |
| Per lookup | ~486 ns |
Run benchmarks yourself:
python benchmarks/bench_request_response.py
python benchmarks/bench_serialization.py
python benchmarks/bench_routing.py
python benchmarks/bench_vs_fastapi.py
Development
git clone https://github.com/ashimov/HawkAPI.git
cd HawkAPI
pip install -e ".[dev]"
# Run tests (816 tests)
pytest
# Lint and type check
ruff check src/ tests/
pyright src/
License
MIT License. See LICENSE for details.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file hawkapi-0.1.3.tar.gz.
File metadata
- Download URL: hawkapi-0.1.3.tar.gz
- Upload date:
- Size: 2.9 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1b88e075838960d703e8f4f0a496087b18f77576fccaa3e1c7363fdbdac2844c
|
|
| MD5 |
c622c15965c7d50fee6681b004584752
|
|
| BLAKE2b-256 |
b98db4b99a0e1c4f8f9fba025678222ec687be8c31ef1cf99912fbed55be2fbd
|
Provenance
The following attestation bundles were made for hawkapi-0.1.3.tar.gz:
Publisher:
publish.yml on ashimov/HawkAPI
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
hawkapi-0.1.3.tar.gz -
Subject digest:
1b88e075838960d703e8f4f0a496087b18f77576fccaa3e1c7363fdbdac2844c - Sigstore transparency entry: 1340443164
- Sigstore integration time:
-
Permalink:
ashimov/HawkAPI@654abf5eb3f6129c93df83c9c0546dcf001fb1e6 -
Branch / Tag:
refs/tags/v0.1.3 - Owner: https://github.com/ashimov
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@654abf5eb3f6129c93df83c9c0546dcf001fb1e6 -
Trigger Event:
release
-
Statement type:
File details
Details for the file hawkapi-0.1.3-py3-none-any.whl.
File metadata
- Download URL: hawkapi-0.1.3-py3-none-any.whl
- Upload date:
- Size: 197.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0ab058d29b976ebe39c7ca432b3f69c1f99dbe720290a9faf9f738ea56fb52be
|
|
| MD5 |
91d93e0ecad15590d66e3c153c96e820
|
|
| BLAKE2b-256 |
7f7022b88cc7bd0a80c4876542df8260211fef4fc3527a73584f69889ada51e3
|
Provenance
The following attestation bundles were made for hawkapi-0.1.3-py3-none-any.whl:
Publisher:
publish.yml on ashimov/HawkAPI
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
hawkapi-0.1.3-py3-none-any.whl -
Subject digest:
0ab058d29b976ebe39c7ca432b3f69c1f99dbe720290a9faf9f738ea56fb52be - Sigstore transparency entry: 1340443167
- Sigstore integration time:
-
Permalink:
ashimov/HawkAPI@654abf5eb3f6129c93df83c9c0546dcf001fb1e6 -
Branch / Tag:
refs/tags/v0.1.3 - Owner: https://github.com/ashimov
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@654abf5eb3f6129c93df83c9c0546dcf001fb1e6 -
Trigger Event:
release
-
Statement type: