Skip to main content

Django + Bun deployment platform

Project description

djb - Django + Bun Platform

djb mascot

djb is a deployment platform for Django applications with frontend tooling (Bun). It provides utilities for secrets management, deployment, and development workflows.

djb structure:

djb/
├── src/djb/
│   ├── __init__.py      # Package initialization + logging exports
│   ├── config.py        # Configuration (mode, target, project_name, identity)
│   ├── types.py         # Core types (Mode, Target enums)
│   ├── project.py       # Project utilities
│   ├── cli/             # Command-line interface
│   │   ├── djb.py       # Main CLI entry point
│   │   ├── init.py      # Environment initialization
│   │   ├── secrets.py   # Secrets management commands
│   │   ├── deploy.py    # Heroku deployment
│   │   ├── health.py    # Health checks (lint, typecheck, test)
│   │   ├── publish.py   # Package publishing
│   │   ├── superuser.py # Django Superuser syncing
│   │   ├── editable.py  # Editable djb management
│   │   ├── logging.py   # CLI logging utilities
│   │   └── utils.py     # Shared utilities
│   ├── core/            # Core utilities
│   │   └── exceptions.py
│   ├── management/      # Django management commands
│   │   └── commands/
│   │       └── sync_superuser.py
│   └── secrets/         # Encrypted secrets management
│       ├── __init__.py  # Public API exports
│       ├── core.py      # Encryption/decryption
│       └── init.py      # Secrets initialization
└── pyproject.toml

Installation

If you don't have uv installed yet:

# macOS/Linux
curl -LsSf https://astral.sh/uv/install.sh | sh

# Windows
powershell -c "irm https://astral.sh/uv/install.ps1 | iex"

Install djb as a dependency in your project:

# Add djb to your project
uv add djb

# Verify djb is available
djb --help

For local development of djb alongside your project:

# Clone djb into your project as a subdirectory
git clone https://github.com/kajicom/djb

# Install in editable mode
djb editable-djb

Configuration

djb uses a layered configuration system with four global settings:

Setting CLI Flag Env Var Config Key Default
Project Name --project-name DJB_PROJECT_NAME project_name pyproject.toml project.name
Mode --mode DJB_MODE mode development
Target --target DJB_TARGET target heroku
Project Dir --project-dir DJB_PROJECT_DIR project_dir Current directory

Resolution priority (highest to lowest):

  1. CLI flag
  2. Environment variable
  3. .djb/config.yaml
  4. Default value

Modes

  • development - Local development (default)
  • staging - Staging environment
  • production - Production deployment

Mode affects which secrets are loaded during deployment and triggers safety guards:

# Deploy with production mode (recommended)
djb --mode production deploy heroku

# Mode persists to config when explicitly set
djb --mode production deploy heroku  # Saves mode=production
djb deploy heroku                    # Uses saved production mode

Configuration File

Configuration is stored in .djb/config.yaml:

project_name: myapp
mode: production
name: Your Name
email: you@example.com

Run djb init to set up configuration interactively.

Features

Initialization

One-command setup for development environment:

# Full initialization
djb init

# Initialize with options
djb init --skip-brew          # Skip Homebrew dependencies
djb init --skip-frontend      # Skip frontend setup
djb init --skip-secrets       # Skip secrets initialization
djb init --project-root /path # Specify project directory

This installs:

  • System dependencies via Homebrew (age, SOPS, PostgreSQL, GDAL, Bun)
  • Python dependencies (uv sync)
  • Frontend dependencies (bun install)
  • Encrypted secrets management

Secrets Management

Age + SOPS encrypted secrets for secure configuration:

# Initialize project (creates .age/keys.txt, secrets, and config)
djb init

# Edit environment secrets
djb secrets edit dev
djb secrets edit production

# View secrets
djb secrets view dev
djb secrets list

# Backup private key to clipboard (store in password manager!)
djb secrets export-key | pbcopy

Each project has its own encryption key stored in .age/keys.txt. Make sure to back up your key securely. If lost, you won't be able to decrypt existing secrets. Copy your private Age key to the clipboard:

djb secrets export-key | pbcopy

Documentation: See docs/SECRETS_GUIDE.md

How Secrets Encryption Works

djb uses a layered encryption approach:

  1. Age encryption encrypts the actual secrets (SOPS files)
  2. GPG encryption protects the Age private key at rest
  3. SOPS provides multi-recipient encryption for team collaboration

The encryption flow:

  • Your Age private key is GPG-encrypted at .age/keys.txt.gpg
  • When you run djb secrets edit, the key is temporarily decrypted
  • SOPS uses your Age key to decrypt/encrypt the secrets file
  • The Age key is immediately re-encrypted when done

Manual Recovery Operations

If djb commands fail, you can use these manual recovery operations:

Decrypt age key manually:

gpg --decrypt .age/keys.txt.gpg > .age/keys.txt
# Now you can use the plaintext key with SOPS

Encrypt age key manually:

gpg --encrypt --recipient your@email.com --armor --output .age/keys.txt.gpg .age/keys.txt
rm .age/keys.txt

Decrypt SOPS secrets manually:

SOPS_AGE_KEY_FILE=.age/keys.txt sops --decrypt secrets/dev.yaml

Encrypt/edit SOPS secrets manually:

SOPS_AGE_KEY_FILE=.age/keys.txt sops secrets/dev.yaml

Emergency Recovery

Lost age key: If you've lost your age private key and don't have a backup, the encrypted secrets are unrecoverable. Prevention:

  1. Store your age key in a password manager immediately after generation
  2. Use djb secrets export-key | pbcopy to copy it to clipboard for backup

Corrupt .sops.yaml:

  1. Check git history: git log -p secrets/.sops.yaml
  2. Restore from git: git checkout HEAD~1 -- secrets/.sops.yaml
  3. Or regenerate with: djb secrets rotate

GPG agent not responding: If GPG prompts hang or fail:

gpgconf --kill gpg-agent
gpgconf --launch gpg-agent

Team Member Onboarding

When a new team member joins:

  1. They run djb init to generate their own age keypair
  2. Their public key is added to secrets/.sops.yaml
  3. An existing team member runs djb secrets rotate to re-encrypt project secrets
  4. The new member can now decrypt staging/production secrets

When a team member leaves:

  1. Remove their public key from secrets/.sops.yaml
  2. Run djb secrets rotate to re-encrypt with remaining keys
  3. Consider rotating any secrets they had access to

Health Checks

Run linting, type checking, and tests for your project:

# Run all health checks (lint + typecheck + tests with coverage)
djb health

# Run specific checks
djb health lint             # Run linting (black for backend, bun lint for frontend)
djb health lint --fix       # Auto-fix lint issues
djb health typecheck        # Run type checking (pyright for backend, tsc for frontend)
djb health test             # Run tests (pytest for backend, bun test for frontend)
djb health e2e              # Run E2E tests (pytest --run-e2e)

# Scope to backend or frontend only
djb health --backend        # Backend checks only
djb health --frontend       # Frontend checks only
djb health --backend typecheck  # Backend type checking only

Code Coverage: Tests run with coverage enabled by default. Coverage reports show which lines are missing test coverage:

# Run tests with coverage (default)
djb health test

# Disable coverage for faster test runs
djb health test --no-cov

Coverage configuration is in pyproject.toml under [tool.coverage.*] sections. HTML reports are generated in htmlcov/.

Editable Mode Awareness: When djb is installed in editable mode (e.g., during development), health checks automatically run for both the djb package and the host project. When running from inside the djb directory, only djb is checked (host project is skipped).

Deployment

Heroku deployment with frontend builds, secrets sync, and migrations:

# Deploy to Heroku (uses project_name from config)
djb deploy heroku

# Deploy in production mode (recommended)
djb --mode production deploy heroku

# Or specify app explicitly
djb deploy heroku --app myapp

# Deploy with options
djb deploy heroku --local-build --skip-secrets

# Configure Heroku app (buildpacks, postgres, git remote)
djb deploy heroku setup

# Revert to previous deployment
djb deploy heroku revert

# Revert to specific commit
djb deploy heroku revert abc1234

Project Name: The Heroku app name is determined from:

  1. --app CLI option
  2. project_name in .djb/config.yaml
  3. project.name in pyproject.toml

Run djb init to configure your project name.

Usage

Command Line

Run djb commands directly:

djb <command>

Python API

Import djb modules directly in Python code:

from djb.secrets import load_secrets, load_secrets_for_mode
from djb.types import Mode

# Load secrets by environment name
secrets = load_secrets("production")
api_key = secrets['api_keys']['stripe']

# Load secrets by Mode enum (recommended for CLI integration)
secrets = load_secrets_for_mode(Mode.PRODUCTION)

# Get project name from config
from djb import get_project_name
project = get_project_name()  # Returns project_name from config or pyproject.toml

Development

Running Tests

# Unit tests
uv run pytest

# E2E tests (requires GPG, age, SOPS, PostgreSQL)
uv run pytest --run-e2e tests/e2e/

# Specific E2E test file
uv run pytest --run-e2e tests/e2e/test_secrets.py -v

# Only E2E tests (skip unit tests)
uv run pytest --only-e2e

Prerequisites for E2E tests:

  • GPG: brew install gnupg
  • age: brew install age
  • SOPS: brew install sops
  • PostgreSQL: brew install postgresql@17

Adding New Commands

  1. Create a new subcommand module in djb/cli/
  2. Define your Click command group
  3. Register it in djb/cli/djb.py:
from djb.cli.mycommand import mycommand

djb_cli.add_command(mycommand)
  1. Add E2E tests in tests/e2e/test_mycommand.py

Adding New Features

  1. Implement the feature in an appropriate module under djb/
  2. Export public API in djb/__init__.py if needed
  3. Add CLI commands if applicable
  4. Add E2E tests for CLI commands
  5. Update documentation

E2E Test Guidelines

E2E tests live in tests/e2e/ and use the @pytest.mark.e2e marker:

import pytest

pytestmark = pytest.mark.e2e  # Mark all tests in module as e2e

def test_my_command(runner, isolated_project):
    result = runner.invoke(djb_cli, ["my-command"])
    assert result.exit_code == 0

Key principles:

  • Use real tools (GPG, age, SOPS, PostgreSQL)
  • Mock cloud services (Heroku, PyPI)
  • Isolate test environment using tool-specific flags (e.g., GNUPGHOME, SOPS_AGE_KEY_FILE)
  • Use tmp_path for all file operations
  • Ensure error-safe encryption handling (always cleanup plaintext on failure)

See tests/e2e/conftest.py for shared fixtures and tests/e2e/utils.py for utilities.

Architecture Decisions

Why Integrated Development

djb can be embedded within projects as a subdirectory and installed in editable mode. This allows:

  1. Rapid iteration on both the platform and application
  2. Project-specific customization
  3. Simplified dependency management during development

For production deployments, djb is installed from PyPI.

Future Plans

Planned djb features:

  • Environment initialization - djb init
  • Deployment commands (Heroku) - djb deploy heroku, djb deploy heroku revert
  • Heroku setup - djb deploy heroku setup (buildpacks, postgres, git remote)
  • Project name auto-detection from config and pyproject.toml
  • Global configuration (mode, target, project_name)
  • Deployment guards (warns if not in production mode)
  • Mode-based secrets loading
  • Git hooks setup via djb init (pre-commit hook for editable djb check)
  • Multi-recipient secret encryption
  • Secret rotation automation
  • Deployment commands (Kubernetes)
  • Development server management
  • Database migration utilities
  • Environment variable syncing

References

License

djb is licensed under the MIT License.

Mascot Attribution

The djb mascot (dj_bun) was created for this project and is distributed under CC BY-SA 4.0.



/dj_bun: playin' dev and deploy since 1984 🎶

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

djb-0.2.31.tar.gz (154.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

djb-0.2.31-py3-none-any.whl (180.8 kB view details)

Uploaded Python 3

File details

Details for the file djb-0.2.31.tar.gz.

File metadata

  • Download URL: djb-0.2.31.tar.gz
  • Upload date:
  • Size: 154.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for djb-0.2.31.tar.gz
Algorithm Hash digest
SHA256 a79ed9ba22e0b9043a31616b01b1bb0dc41965c241e349deb24ffd4a15aff3cf
MD5 e14fcd8bd71d74805637570369f92b0e
BLAKE2b-256 7f58f247b350b991b533f293da9f361395034e868c59a941a3284766664d0e27

See more details on using hashes here.

Provenance

The following attestation bundles were made for djb-0.2.31.tar.gz:

Publisher: publish.yaml on kajicom/djb

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file djb-0.2.31-py3-none-any.whl.

File metadata

  • Download URL: djb-0.2.31-py3-none-any.whl
  • Upload date:
  • Size: 180.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for djb-0.2.31-py3-none-any.whl
Algorithm Hash digest
SHA256 297c66c5a664f8b2f8f75b41203cba0795d6e375a31f5389fbe3e6c40c40f283
MD5 5de8954f8469d111a800c3d2977d199b
BLAKE2b-256 11f384f6602b05924098d8eacca0353280349c39c9444f0e0a78e20367a4fab6

See more details on using hashes here.

Provenance

The following attestation bundles were made for djb-0.2.31-py3-none-any.whl:

Publisher: publish.yaml on kajicom/djb

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page