A flexible & capable API layer for Django.
Creating delicious APIs for Django apps since 2010.
Currently in beta (v0.9.14) but being used actively in production on several sites.
- Python 2.6+ or Python 3.3+
- Django 1.5+
- dateutil (http://labix.org/python-dateutil) >= 2.1
- HTTP Digest authentication: python3-digest (https://bitbucket.org/akoha/python-digest/)
What’s It Look Like?
A basic example looks like:
# myapp/api.py # ============ from tastypie.resources import ModelResource from myapp.models import Entry class EntryResource(ModelResource): class Meta: queryset = Entry.objects.all() # urls.py # ======= from django.conf.urls.defaults import * from tastypie.api import Api from myapp.api import EntryResource v1_api = Api(api_name='v1') v1_api.register(EntryResource()) urlpatterns = patterns('', # The normal jazz here then... (r'^api/', include(v1_api.urls)), )
That gets you a fully working, read-write API for the Entry model that supports all CRUD operations in a RESTful way. JSON/XML/YAML support is already there, and it’s easy to add related data/authentication/caching.
You can find more in the documentation at http://django-tastypie.readthedocs.org/.
There are other, better known API frameworks out there for Django. You need to assess the options available and decide for yourself. That said, here are some common reasons for tastypie.
- You need an API that is RESTful and uses HTTP well.
- You want to support deep relations.
- You DON’T want to have to write your own serializer to make the output right.
- You want an API framework that has little magic, very flexible and maps well to the problem domain.
- You want/need XML serialization that is treated equally to JSON (and YAML is there too).
- You want to support my perceived NIH syndrome, which is less about NIH and more about trying to help out friends/coworkers.
Tastypie is committed to providing a flexible and secure API, and was designed with many security features and options in mind. Due to the complex nature of APIs and the constant discovery of new attack vectors and vulnerabilities, no software is immune to security holes. We rely on our community to report and help us investigate security issues.
If you come across a security hole please do not open a Github issue. Instead, drop us an email at firstname.lastname@example.org
We’ll then work together to investigate and resolve the problem so we can announce a solution along with the vulnerability.