Skip to main content

Flake8 plugin to enforce import restrictions in Python projects.

Project description

GitHub License PyPI version Downloads Static Badge Python versions codecov GitHub last commit

Flake8 Import Guard 💂

Flake8 Import Guard is a Flake8 plugin that helps enforce import restrictions in your Python projects. It allows you to specify forbidden imports and detects their usage in your codebase, focusing on newly added imports in version-controlled files.

Features

  • 🚫 Detects forbidden imports in new and modified files
  • 🔧 Configurable via .flake8 or pyproject.toml
  • 🔍 Focuses on newly added imports in Git-versioned files
  • 🔗 Seamless integration with existing Flake8 workflows

Motivation

Flake8 Import Guard is designed to address several common challenges in Python development.

  • Enforcing Security Measures

    • Prevent the use of potentially unsafe or deprecated modules, enhancing the overall security of your codebase.
    • Prevent the import of forbidden external libraries, maintaining better control over your project's external dependencies.
  • Dependency Management

    • Restrict and control project dependencies, reducing complexity and potential conflicts.
  • License Compliance

    • Ensure compliance with licensing requirements by preventing the use of libraries with incompatible licenses.
  • Performance Optimization

    • Avoid the use of heavyweight or inefficient imports that could impact performance.
  • Coding Standards Enforcement

    • Maintain consistent coding standards across your project by enforcing specific import patterns.
  • Gradual Deprecation of Legacy Code

    • Facilitate the phasing out of old modules or deprecated imports as your project evolves.

By using Flake8 Import Guard, development teams can proactively manage their codebase, ensuring better quality, security, and maintainability of their Python projects.

Installation

You can install Flake8 Import Guard using pip.

pip install flake8-import-guard

Usage

Once installed, Flake8 Import Guard will automatically be used by Flake8. You can run it using the standard Flake8 command.

flake8 path/to/your/code

Recommended Integration

It is highly recommended to integrate Flake8 Import Guard into your pre-commit hooks and CI workflows. This ensures that import restrictions are enforced consistently across your development process, catching potential violations early and maintaining code quality standards.

Configuration

You can configure Flake8 Import Guard using Flake8's standard configuration system or through pyproject.toml.

For example, let's say you want to prohibit the use of load_dotenv and subprocess in your project. Here's how you would configure that.

Using Flake8 Configuration

Add the following to your .flake8 file.

[flake8]
forbidden_imports = load_dotenv,subprocess

Using pyproject.toml

Add the following to your pyproject.toml file.

[tool.flake8-import-guard]
forbidden_imports = [
    "load_dotenv",
    "subprocess"
]

Example

Configuration

Let's say you have the following configuration in your .flake8 file.

[flake8]
forbidden_imports = load_dotenv,subprocess

Sample Python File

Consider the following Python file.

# test_file.py
import os
from datetime import datetime

from subprocess import check_output  # Violation Module

from dotenv import load_dotenv       # Violation Module

def main():
    pass

if __name__ == "__main__":
    main()

Execution and Result

When you run Flake8 on this file, you'll get the following output.

$ flake8 test_file.py
test_file.py:4:1: CPE001 Forbidden import found: subprocess.check_output
test_file.py:6:1: CPE001 Forbidden import found: dotenv.load_dotenv

How It Works

flake8-import-guard uses Git to detect changes in your codebase and enforce import restrictions. Here's a detailed explanation of its operation.

  1. For new files

    • It checks all imports against the forbidden list.
    • Any import found in the forbidden list is reported as a violation.
  2. For existing files

    • It compares the current version with the last committed version to identify newly added imports.
    • Only newly added imports that match the forbidden list are reported as violations.

[!IMPORTANT] If a forbidden import already exists in the file at the time of introducing flake8-import-guard, it will not be detected as a violation. The plugin focuses only on new changes to prevent disruption to existing codebases.

  1. Violation reporting
    • Only newly added imports that match the forbidden list are reported as violations.
    • This approach allows for gradual implementation of import restrictions without causing immediate breaks in existing code.

This behavior ensures that introducing flake8-import-guard to an existing project doesn't immediately flag all existing forbidden imports, allowing for a smoother integration and gradual code improvement.

Capabilities and Limitations

What It Can Do

  • Detect newly added forbidden imports in both new and existing files
  • Work with Git-versioned projects
  • Configure forbidden imports through Flake8 config or pyproject.toml
  • Integrate seamlessly with existing Flake8 workflows

What It Cannot Do

  • Work in non-Git environments
  • Identify removed or modified imports (focus is on new additions only)
  • Detect indirect imports (e.g., imports within imported modules)

Error Codes

  • CPE001: Forbidden import found

Contributing

Contributions are welcome! Please feel free to submit a Pull Request. See CONTRIBUTING.md to get an idea of how contributions work.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

flake8_import_guard-1.0.0.tar.gz (6.3 kB view details)

Uploaded Source

Built Distribution

flake8_import_guard-1.0.0-py3-none-any.whl (6.8 kB view details)

Uploaded Python 3

File details

Details for the file flake8_import_guard-1.0.0.tar.gz.

File metadata

  • Download URL: flake8_import_guard-1.0.0.tar.gz
  • Upload date:
  • Size: 6.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.10.14 Linux/6.5.0-1025-azure

File hashes

Hashes for flake8_import_guard-1.0.0.tar.gz
Algorithm Hash digest
SHA256 b92476d2f6f737498a4a1e95ed0ad649a02dddc4657b164c926247f3254921df
MD5 b0fcd71cd627e5f3f2e5702759d7a806
BLAKE2b-256 11c9b2c0627b1bb83237e9665cd25a0dc0938ba03f3f42e0c8770b714524d4d3

See more details on using hashes here.

File details

Details for the file flake8_import_guard-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for flake8_import_guard-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 af2aebedfc5733b67889780130e07b94f9feaf62ec9d74356c05841e3c71ebe7
MD5 76e0bad059910326cd6c57f5761e5b03
BLAKE2b-256 8d1d4131f1367d4cba2b5b0872cd332b901da0219620621be23b79c4338188d9

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page