Certificate verification against CRLs
Project description
swarmauri_certs_crlverifyservice
CRL-based certificate verification service for the Swarmauri SDK.
This package implements an ICertService that checks X.509 certificates
against Certificate Revocation Lists as described in
RFC 5280. It validates the
certificate's validity period, issuer, and revocation status.
Features
CrlVerifyServiceadapter dedicated to revocation-aware verification and parsing.- Accepts PEM or DER certificates/CRLs and normalizes them with
cryptography. - Returns structured validity metadata, revocation flags, issuers, and extension details.
- Focuses purely on verification; CSR and signing flows stay delegated to other Swarmauri services.
Prerequisites
- Python 3.10 or newer.
- Access to up-to-date CRLs for the certificate authorities you care about.
- Certificates and CRLs stored in PEM (Base64) or DER; the service can decode either.
- Optional: trusted root/intermediate certificates if you plan to record issuer context alongside revocation checks.
Installation
# pip
pip install swarmauri_certs_crlverifyservice
# poetry
poetry add swarmauri_certs_crlverifyservice
# uv (pyproject-based projects)
uv add swarmauri_certs_crlverifyservice
Quickstart: Revocation Check
Load a certificate and its corresponding CRL, then validate the revocation status and validity window:
import asyncio
from pathlib import Path
from swarmauri_certs_crlverifyservice import CrlVerifyService
async def main() -> None:
service = CrlVerifyService()
cert_bytes = Path("leaf.pem").read_bytes()
crl_bytes = Path("issuer.crl").read_bytes()
verification = await service.verify_cert(
cert=cert_bytes,
crls=[crl_bytes],
check_revocation=True,
)
if verification["valid"]:
print("Certificate is valid.")
elif verification.get("revoked"):
print("Certificate was revoked:", verification["reason"])
else:
print("Certificate failed validation:", verification["reason"])
if __name__ == "__main__":
asyncio.run(main())
Parsing Metadata
Use parse_cert to surface fields needed for logging, auditing, or dashboards:
import asyncio
from pathlib import Path
from swarmauri_certs_crlverifyservice import CrlVerifyService
async def describe() -> None:
service = CrlVerifyService()
cert_bytes = Path("leaf.pem").read_bytes()
metadata = await service.parse_cert(cert_bytes)
print("Subject:", metadata["subject"])
print("Valid until:", metadata["not_after"])
print("Key usage:", metadata.get("key_usage"))
if __name__ == "__main__":
asyncio.run(describe())
Best Practices
- Refresh CRLs frequently; RFC 5280
nextUpdatedictates how long a CRL should be considered valid. - Combine this service with Swarmauri signing services to perform a full lifecycle check (issue → deploy → monitor).
- Cache CRLs in memory or a fast datastore to avoid repeatedly downloading them when calling
verify_cert. - Log verification outputs (especially
reasonandrevoked) to your observability pipeline to catch trust issues early.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file swarmauri_certs_crlverifyservice-0.1.2.dev6.tar.gz.
File metadata
- Download URL: swarmauri_certs_crlverifyservice-0.1.2.dev6.tar.gz
- Upload date:
- Size: 8.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7d862823012a52aaf5e84eb27b9b8262e3db226f6a8870810993f321f905bc95
|
|
| MD5 |
8833cf0274ac3cbf5e801ea0cfa34f1f
|
|
| BLAKE2b-256 |
e67c8b6d44c4b92ddfa523ee2757f7d389be25c9392dd2ca9b4e64d56fbae295
|
File details
Details for the file swarmauri_certs_crlverifyservice-0.1.2.dev6-py3-none-any.whl.
File metadata
- Download URL: swarmauri_certs_crlverifyservice-0.1.2.dev6-py3-none-any.whl
- Upload date:
- Size: 9.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c6d4d8fadcf498d27243ee208c37f3113c313882af3a59f1c4f180f778841e35
|
|
| MD5 |
fa37b46b85fb119dd782d58c005c2461
|
|
| BLAKE2b-256 |
4251110b5f4b23d7618b079c63c01ee1069e4d041b251343b6188fd55fab8845
|