Skip to main content

Certificate verification against CRLs

Project description

Swarmauri Logo

PyPI - Downloads Hits PyPI - Python Version PyPI - License PyPI - swarmauri_certs_crlverifyservice


swarmauri_certs_crlverifyservice

CRL-based certificate verification service for the Swarmauri SDK.

This package implements an ICertService that checks X.509 certificates against Certificate Revocation Lists as described in RFC 5280. It validates the certificate's validity period, issuer, and revocation status.

Features

  • CrlVerifyService adapter dedicated to revocation-aware verification and parsing.
  • Accepts PEM or DER certificates/CRLs and normalizes them with cryptography.
  • Returns structured validity metadata, revocation flags, issuers, and extension details.
  • Focuses purely on verification; CSR and signing flows stay delegated to other Swarmauri services.

Prerequisites

  • Python 3.10 or newer.
  • Access to up-to-date CRLs for the certificate authorities you care about.
  • Certificates and CRLs stored in PEM (Base64) or DER; the service can decode either.
  • Optional: trusted root/intermediate certificates if you plan to record issuer context alongside revocation checks.

Installation

# pip
pip install swarmauri_certs_crlverifyservice

# poetry
poetry add swarmauri_certs_crlverifyservice

# uv (pyproject-based projects)
uv add swarmauri_certs_crlverifyservice

Quickstart: Revocation Check

Load a certificate and its corresponding CRL, then validate the revocation status and validity window:

import asyncio
from pathlib import Path

from swarmauri_certs_crlverifyservice import CrlVerifyService


async def main() -> None:
    service = CrlVerifyService()

    cert_bytes = Path("leaf.pem").read_bytes()
    crl_bytes = Path("issuer.crl").read_bytes()

    verification = await service.verify_cert(
        cert=cert_bytes,
        crls=[crl_bytes],
        check_revocation=True,
    )

    if verification["valid"]:
        print("Certificate is valid.")
    elif verification.get("revoked"):
        print("Certificate was revoked:", verification["reason"])
    else:
        print("Certificate failed validation:", verification["reason"])


if __name__ == "__main__":
    asyncio.run(main())

Parsing Metadata

Use parse_cert to surface fields needed for logging, auditing, or dashboards:

import asyncio
from pathlib import Path

from swarmauri_certs_crlverifyservice import CrlVerifyService


async def describe() -> None:
    service = CrlVerifyService()
    cert_bytes = Path("leaf.pem").read_bytes()

    metadata = await service.parse_cert(cert_bytes)
    print("Subject:", metadata["subject"])
    print("Valid until:", metadata["not_after"])
    print("Key usage:", metadata.get("key_usage"))


if __name__ == "__main__":
    asyncio.run(describe())

Best Practices

  • Refresh CRLs frequently; RFC 5280 nextUpdate dictates how long a CRL should be considered valid.
  • Combine this service with Swarmauri signing services to perform a full lifecycle check (issue → deploy → monitor).
  • Cache CRLs in memory or a fast datastore to avoid repeatedly downloading them when calling verify_cert.
  • Log verification outputs (especially reason and revoked) to your observability pipeline to catch trust issues early.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

swarmauri_certs_crlverifyservice-0.1.2.tar.gz (8.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file swarmauri_certs_crlverifyservice-0.1.2.tar.gz.

File metadata

  • Download URL: swarmauri_certs_crlverifyservice-0.1.2.tar.gz
  • Upload date:
  • Size: 8.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.3 {"installer":{"name":"uv","version":"0.10.3","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for swarmauri_certs_crlverifyservice-0.1.2.tar.gz
Algorithm Hash digest
SHA256 a2c3d912ff75cd3c0d7ad3a2904757258cdf26bea239de60cd5f04d42b60ae73
MD5 f68520a3f357e0073000ed0c88452e94
BLAKE2b-256 4b837096521323521f176d1be9509b49441819357465574e74e33b65a5e979fc

See more details on using hashes here.

File details

Details for the file swarmauri_certs_crlverifyservice-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: swarmauri_certs_crlverifyservice-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 9.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.3 {"installer":{"name":"uv","version":"0.10.3","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for swarmauri_certs_crlverifyservice-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e3f5e3c9e04303096a2ca6413a54d2cea8007acc3016eca32e862000e0094495
MD5 62c0c656abebf31117392336a4236529
BLAKE2b-256 b9300e204698fab05ffa1076acb9316cdf222dfe41b7e4a5c6a10d7b6c4ac20f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page