Lucairn — privacy-preserving AI gateway client for Python
Project description
lucairn — Python SDK
Client for Lucairn — privacy-preserving AI gateway.
Status
1.0.0. Ships alongside the TypeScript SDK and behaves identically at the
observable level. See the monorepo README for the full SDK
index.
Migration from the previous release: the package was previously
published under a different name (pre-1.0). For one minor-version cycle,
an in-tree compatibility shim re-exports every public symbol under its
previous name and emits a DeprecationWarning on import. To migrate,
change your imports to the new top-level names — the rename map and an
example are below.
# old (still works for one minor cycle, with DeprecationWarning):
from theveil import TheVeil, TheVeilConfig
# new:
from lucairn import Lucairn, LucairnConfig
Install
pip install lucairn
Requires Python 3.10+.
Quickstart
from lucairn import Lucairn, LucairnConfig, VerifyCertificateKeys
client = Lucairn(LucairnConfig(api_key="dsa_..."))
# Proxy a prompt through the Lucairn gateway (split-knowledge routing).
response = client.messages({
"prompt_template": "Summarize the following in one sentence: {text}",
"context": {"text": "Long input..."},
"model": "claude-opus-4-7",
"max_tokens": 256,
})
# Fetch the Veil Certificate for a known request_id (Pro / Enterprise tier).
cert = client.get_certificate("req_abc123")
# Verify the witness Ed25519 signature against pinned trust-root keys.
keys = VerifyCertificateKeys(
witness_key_id="witness_v1",
witness_public_key="<base64 of raw 32-byte Ed25519 public key>",
)
result = client.verify_certificate(cert, keys)
print(result.overall_verdict, result.anchor_status)
Public API
Lucairn(config: LucairnConfig)
Constructor validates every input up front:
api_keymust match^dsa_[0-9a-f]{32}$.base_urlmust behttp://orhttps://; defaults tohttps://gateway.lucairn.eu.timeoutmust be a positive finite number of seconds (default30.0). TS SDK equivalent istimeoutMs(milliseconds) — Python uses seconds to matchhttpx/requests/openai-python/anthropic-python.
client.messages(params, options=None)
POST to /api/v1/proxy/messages. Returns a discriminated union:
ProxySyncResponse— terminal result (gateway returned 200).ProxyAcceptedResponse— async processing receipt (gateway returned 202, bodystatus: "processing"). Poll thestatus_urluntil completion.
client.get_certificate(request_id, options=None)
GET /api/v1/veil/certificate/{request_id}. Happy-path returns a
VeilCertificate. Gateway-side pending (certificate not yet assembled, or
unknown request_id — the gateway does not distinguish) surfaces as
LucairnHttpError with status=202 and a body
{"status": "pending", "retry_after_seconds": 30, ...} so the happy-path
return stays narrow. Inspect err.body["retry_after_seconds"] for the
retry signal.
No auto-verification — chain client.verify_certificate() explicitly.
client.get_certificate_summary(request_id, options=None)
GET /api/v1/veil/certificate/{request_id}/summary. Returns the
DPO-friendly HTML summary as a UTF-8 str. Per the gateway source the
pending case renders an HTML body at HTTP 200 (not a 202 wrapper), so
the SDK passes the rendered HTML straight back to the caller.
client.list_audit_events(opts=None)
GET /api/v1/audit/export. Returns an AuditExportResponse with the
customer's audit events for the requested lookback window:
from lucairn import AuditExportOptions
resp = client.list_audit_events(AuditExportOptions(days=7, type="proxy.completed"))
print(resp.tier, resp.total_events)
for e in resp.events:
print(e.timestamp, e.event_type, e.request_id)
days: int 1..90 (gateway default 30, max 90).type: optional event-type filter.- 503
audit_export_unavailable(tier-gated; not enabled for the calling customer) raisesLucairnHttpErrorwitherr.status == 503anderr.body["code"] == "audit_export_unavailable".
client.verify_certificate(cert, keys)
Verify a certificate's witness Ed25519 signature against the certificate's
canonical-JSON signed subset. Returns VerifyCertificateResult on success.
Raises LucairnCertificateError with one of five reasons on failure:
| reason | condition |
|---|---|
malformed |
cert shape invalid, gateway invariant broken, or unknown verdict |
unsupported_protocol_version |
protocol_version != 2 |
witness_mismatch |
keys.witness_key_id != cert.witness_key_id |
witness_signature_missing |
empty or whitespace-only witness_signature |
invalid_signature |
Ed25519 verify failed, or key input malformed |
External RFC 3161 timestamp + Sigstore Rekor transparency-log verification are out of scope for this release (pending upstream gateway fixes).
lucairn.get_client_id(cert)
Module-level helper returning cert.client_id (the org-scoped
correlation field added by W2A-B1) or None if the certificate predates
the change. The field is unsigned metadata at the witness signable
layer — tamper evidence flows indirectly through the bridge claim's
bridge-signed canonical_payload.
Error hierarchy
All SDK errors inherit from LucairnError:
LucairnConfigError— bad constructor input or per-call option.LucairnHttpError— gateway returned non-2xx (or 202 fromget_certificate); exposes.statusand.body.LucairnResponseValidationError— gateway returned 2xx but the body doesn't fit the declared response type (typically a gateway bug or version skew); exposes.body(raw response). The underlyingpydantic.ValidationErrororValueErroris preserved on__cause__for field-level inspection.LucairnTimeoutError— request exceeded timeout.LucairnCertificateError—verify_certificatefailed; exposes.reasonand (when available).certificate_id.
Catch LucairnError to handle all SDK errors uniformly.
Behavioural parity with TS
This SDK is cross-language byte-equivalent to the TS SDK for
canonical_json and verify_certificate. The Go-assembler-signed cert
fixture (cert-go-signed-reference.json) verifies identically in both.
Intentional divergences where TS semantics don't port cleanly to Python:
- Timeout: seconds (Python) vs. milliseconds (TS). Validator shape identical (positive finite).
- Abort/cancel: v1 sync Python has timeout only; no
signalanalogue. Cancellation arrives with the async client in a later arc. - Malformed 2xx body: TS passes through as raw text typed as
VeilCertificate(thin transport); Python callsVeilCertificate.model_validateand, on a shape mismatch, raises the dedicatedLucairnResponseValidationError— NOTLucairnHttpError. The Python class follows the established Python-SDK precedent (openai.APIResponseValidationError,anthropic.APIResponseValidationError): an HTTP 200 is not an HTTP error, and callers benefit from being able to catch "transport failed" separately from "body doesn't fit the declared type." TS's pass-through model remains the authoritative behaviour for the TS surface; Python fails earlier (at fetch) because Pydantic validates at deserialize-time, and the failure class names the reason precisely instead of lying viastatus=200. - Error
.bodytype on over-cap: Python stores the preserved prefix asstr(UTF-8-decoded witherrors='replace') — idiomatic for Python SDK callers used tohttpx.Response.text/.json(). The Go SDK stores.Bodyas[]bytefor the same case — idiomatic for Go callers used toresp.Body-style byte-slice access. Behaviour parity holds at the "the prefix is preserved, bounded, and diagnostic-readable" level; the representation is intentionally language-idiomatic, not byte-identical. - Literal JSON null body: when the gateway returns a 2xx with the
literal
nullpayload, the parsed body is PythonNone; the SDK falls back to the raw pre-parse text ("null") forLucairnResponseValidationError.bodyso callers can distinguish "gateway sent null" from "SDK forgot to populate the error body."
Development
cd python
pip install -e ".[dev]"
pytest
Tests include a byte-for-byte cross-check of Python canonical-JSON output
against the Go assembler's reference hex, and end-to-end verification of
a real Go-assembler-signed certificate. If either fails, the SDK's Ed25519
verify will silently produce invalid_signature on valid certs — do not
skip or soft-fail those tests.
License
MIT — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file lucairn-1.0.0.tar.gz.
File metadata
- Download URL: lucairn-1.0.0.tar.gz
- Upload date:
- Size: 26.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
600c407accbaea4045d1a6c4d3cc0930c0c5162cd6229bad3b1ac4db9648a381
|
|
| MD5 |
95706b6f65e9c609b8d92a1779dd97d3
|
|
| BLAKE2b-256 |
da3c7698eba56cc8d0302494021866111283cb38a462eec3f90d3eb6c5b7d7ce
|
File details
Details for the file lucairn-1.0.0-py3-none-any.whl.
File metadata
- Download URL: lucairn-1.0.0-py3-none-any.whl
- Upload date:
- Size: 33.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
26cf660579aa64bff4c16db0c0d8f7be8d120c4774fc6c9ea86570ac9688d9d6
|
|
| MD5 |
f601d44d54ba307cad11ba4e23eb68d3
|
|
| BLAKE2b-256 |
0afc18f1e957f1df287da003ead5b9e13cd4414c79f3a3c6c379800e78aba503
|