The Veil — privacy-preserving AI infrastructure client for Python
This project has been archived.
The maintainers of this project have marked this project as archived. No new releases are expected.
Project description
theveil — Python SDK
Client for The Veil — privacy-preserving AI infrastructure.
Status
Pre-1.0 (0.1.0). Ships alongside the TypeScript SDK's 0.2.0 and behaves
identically at the observable level. See the monorepo
README for the full SDK index.
Install
pip install theveil
Requires Python 3.10+.
Quickstart
from theveil import TheVeil, TheVeilConfig, VerifyCertificateKeys
client = TheVeil(TheVeilConfig(api_key="dsa_..."))
# Proxy a prompt through the Veil gateway (split-knowledge routing).
response = client.messages({
"prompt_template": "Summarize the following in one sentence: {text}",
"context": {"text": "Long input..."},
"model": "claude-opus-4-7",
"max_tokens": 256,
})
# Fetch the Veil Certificate for a known request_id (Pro+/Enterprise tier).
cert = client.get_certificate("req_abc123")
# Verify the witness Ed25519 signature against pinned trust-root keys.
keys = VerifyCertificateKeys(
witness_key_id="witness_v1",
witness_public_key="<base64 of raw 32-byte Ed25519 public key>",
)
result = client.verify_certificate(cert, keys)
print(result.overall_verdict, result.anchor_status)
Public API
TheVeil(config: TheVeilConfig)
Constructor validates every input up front:
api_keymust match^dsa_[0-9a-f]{32}$.base_urlmust behttp://orhttps://; defaults tohttps://gateway.dsaveil.io.timeoutmust be a positive finite number of seconds (default30.0). TS SDK equivalent istimeoutMs(milliseconds) — Python uses seconds to matchhttpx/requests/openai-python/anthropic-python.
client.messages(params, options=None)
POST to /api/v1/proxy/messages. Returns a discriminated union:
ProxySyncResponse— terminal result (gateway returned 200).ProxyAcceptedResponse— async processing receipt (gateway returned 202, bodystatus: "processing"). Poll thestatus_urluntil completion.
client.get_certificate(request_id, options=None)
GET /api/v1/veil/certificate/{request_id}. Happy-path returns a
VeilCertificate. Gateway-side pending (certificate not yet assembled, or
unknown request_id — the gateway does not distinguish) surfaces as
TheVeilHttpError with status=202 and a body
{"status": "pending", "retry_after_seconds": 30, ...} so the happy-path
return stays narrow. Inspect err.body["retry_after_seconds"] for the
retry signal.
No auto-verification — chain client.verify_certificate() explicitly.
client.verify_certificate(cert, keys)
Verify a certificate's witness Ed25519 signature against the certificate's
canonical-JSON signed subset. Returns VerifyCertificateResult on success.
Raises TheVeilCertificateError with one of five reasons on failure:
| reason | condition |
|---|---|
malformed |
cert shape invalid, gateway invariant broken, or unknown verdict |
unsupported_protocol_version |
protocol_version != 2 |
witness_mismatch |
keys.witness_key_id != cert.witness_key_id |
witness_signature_missing |
empty or whitespace-only witness_signature |
invalid_signature |
Ed25519 verify failed, or key input malformed |
External RFC 3161 timestamp + Sigstore Rekor transparency-log verification are out of scope for this release (pending upstream gateway fixes).
Error hierarchy
All SDK errors inherit from TheVeilError:
TheVeilConfigError— bad constructor input or per-call option.TheVeilHttpError— gateway returned non-2xx (or 202 fromget_certificate); exposes.statusand.body.TheVeilResponseValidationError— gateway returned 2xx but the body doesn't fit the declared response type (typically a gateway bug or version skew); exposes.body(raw response). The underlyingpydantic.ValidationErrororValueErroris preserved on__cause__for field-level inspection.TheVeilTimeoutError— request exceeded timeout.TheVeilCertificateError—verify_certificatefailed; exposes.reasonand (when available).certificate_id.
Catch TheVeilError to handle all SDK errors uniformly.
Behavioural parity with TS
This SDK is cross-language byte-equivalent to the TS SDK for
canonical_json and verify_certificate. The Go-assembler-signed cert
fixture (cert-go-signed-reference.json) verifies identically in both.
Intentional divergences where TS semantics don't port cleanly to Python:
- Timeout: seconds (Python) vs. milliseconds (TS). Validator shape identical (positive finite).
- Abort/cancel: v1 sync Python has timeout only; no
signalanalogue. Cancellation arrives with the async client in a later arc. - Malformed 2xx body: TS passes through as raw text typed as
VeilCertificate(thin transport); Python callsVeilCertificate.model_validateand, on a shape mismatch, raises the dedicatedTheVeilResponseValidationError— NOTTheVeilHttpError. The Python class follows the established Python-SDK precedent (openai.APIResponseValidationError,anthropic.APIResponseValidationError): an HTTP 200 is not an HTTP error, and callers benefit from being able to catch "transport failed" separately from "body doesn't fit the declared type." TS's pass-through model remains the authoritative behaviour for the TS surface; Python fails earlier (at fetch) because Pydantic validates at deserialize-time, and the failure class names the reason precisely instead of lying viastatus=200. - Error
.bodytype on over-cap: Python stores the preserved prefix asstr(UTF-8-decoded witherrors='replace') — idiomatic for Python SDK callers used tohttpx.Response.text/.json(). The Go SDK stores.Bodyas[]bytefor the same case — idiomatic for Go callers used toresp.Body-style byte-slice access. Behaviour parity holds at the "the prefix is preserved, bounded, and diagnostic-readable" level; the representation is intentionally language-idiomatic, not byte-identical. - Literal JSON null body: when the gateway returns a 2xx with the
literal
nullpayload, the parsed body is PythonNone; the SDK falls back to the raw pre-parse text ("null") forTheVeilResponseValidationError.bodyso callers can distinguish "gateway sent null" from "SDK forgot to populate the error body."
Development
cd python
pip install -e ".[dev]"
pytest
Tests include a byte-for-byte cross-check of Python canonical-JSON output
against the Go assembler's reference hex, and end-to-end verification of
a real Go-assembler-signed certificate. If either fails, the SDK's Ed25519
verify will silently produce invalid_signature on valid certs — do not
skip or soft-fail those tests.
License
MIT — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file theveil-0.1.1.tar.gz.
File metadata
- Download URL: theveil-0.1.1.tar.gz
- Upload date:
- Size: 22.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
63ac081b988ce4491c3174df260c6498f3508b822f064b877a69afb308f52351
|
|
| MD5 |
75638db2fd8938bcd5a2b2dcef777410
|
|
| BLAKE2b-256 |
95a15dc9691f8b32af96c57daca65f910ef723897a60f03b1ce436ef2a145299
|
File details
Details for the file theveil-0.1.1-py3-none-any.whl.
File metadata
- Download URL: theveil-0.1.1-py3-none-any.whl
- Upload date:
- Size: 28.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
25c62fd725580142d53b0e4a7b424141fd52eb304acb94204a286a0a6ed41351
|
|
| MD5 |
bf08f44eb1b99235303d26e1e3978986
|
|
| BLAKE2b-256 |
c010d6787a86bc83844920be509c3599be77b5158cb1080670b4bc84971efe13
|