Skip to main content

No project description provided

Project description

GitHub License PyPI version Python versions codecov GitHub last commit

Flake8 Import Guard 💂

Flake8 Import Guard is a Flake8 plugin that helps enforce import restrictions in your Python projects. It allows you to specify forbidden imports and detects their usage in your codebase, focusing on newly added imports in version-controlled files.

flake8-import-guard on PyPI

Features

  • 🚫 Detects forbidden imports in new and modified files
  • 🔧 Configurable via .flake8 or pyproject.toml
  • 🔍 Focuses on newly added imports in Git-versioned files
  • 🔗 Seamless integration with existing Flake8 workflows

Motivation

Flake8 Import Guard is designed to address several common challenges in Python development.

  • Enforcing Security Measures

    • Prevent the use of potentially unsafe or deprecated modules, enhancing the overall security of your codebase.
    • Prevent the import of forbidden external libraries, maintaining better control over your project's external dependencies.
  • Dependency Management

    • Restrict and control project dependencies, reducing complexity and potential conflicts.
  • License Compliance

    • Ensure compliance with licensing requirements by preventing the use of libraries with incompatible licenses.
  • Performance Optimization

    • Avoid the use of heavyweight or inefficient imports that could impact performance.
  • Coding Standards Enforcement

    • Maintain consistent coding standards across your project by enforcing specific import patterns.
  • Gradual Deprecation of Legacy Code

    • Facilitate the phasing out of old modules or deprecated imports as your project evolves.

By using Flake8 Import Guard, development teams can proactively manage their codebase, ensuring better quality, security, and maintainability of their Python projects.

Installation

You can install Flake8 Import Guard using pip.

pip install flake8-import-guard

Usage

Once installed, Flake8 Import Guard will automatically be used by Flake8. You can run it using the standard Flake8 command.

flake8 path/to/your/code

Configuration

You can configure Flake8 Import Guard using Flake8's standard configuration system or through pyproject.toml.

For example, let's say you want to prohibit the use of load_dotenv and subprocess in your project. Here's how you would configure that.

Using Flake8 Configuration

Add the following to your .flake8 file.

[flake8]
forbidden_imports = load_dotenv,subprocess

Using pyproject.toml

Add the following to your pyproject.toml file.

[tool.flake8-import-guard]
forbidden_imports = [
    "load_dotenv",
    "subprocess"
]

Example

Configuration

Let's say you have the following configuration in your .flake8 file.

[flake8]
forbidden_imports = load_dotenv,subprocess

Sample Python File

Consider the following Python file.

# test_file.py
import os
from datetime import datetime

from subprocess import check_output  # Violation Module

from dotenv import load_dotenv       # Violation Module

def main():
    pass

if __name__ == "__main__":
    main()

Execution and Result

When you run Flake8 on this file, you'll get the following output.

$ flake8 test_file.py
test_file.py:4:1: CPE001 Forbidden import found: subprocess.check_output
test_file.py:6:1: CPE001 Forbidden import found: dotenv.load_dotenv

How It Works

Flake8 Import Guard uses Git to detect changes in your codebase.

  1. For new files, it checks all imports against the forbidden list.
  2. For existing files, it compares the current version with the last committed version to identify newly added imports.
  3. Only newly added imports that match the forbidden list are reported as violations.

Capabilities and Limitations

What It Can Do

  • Detect newly added forbidden imports in both new and existing files
  • Work with Git-versioned projects
  • Configure forbidden imports through Flake8 config or pyproject.toml
  • Integrate seamlessly with existing Flake8 workflows

What It Cannot Do

  • Work in non-Git environments
  • Identify removed or modified imports (focus is on new additions only)
  • Detect indirect imports (e.g., imports within imported modules)

Error Codes

  • CPE001: Forbidden import found

Contributing

Contributions are welcome! Please feel free to submit a Pull Request. See CONTRIBUTING.md to get an idea of how contributions work.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

flake8_import_guard-0.1.5.tar.gz (5.7 kB view details)

Uploaded Source

Built Distribution

flake8_import_guard-0.1.5-py3-none-any.whl (6.2 kB view details)

Uploaded Python 3

File details

Details for the file flake8_import_guard-0.1.5.tar.gz.

File metadata

  • Download URL: flake8_import_guard-0.1.5.tar.gz
  • Upload date:
  • Size: 5.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.10.14 Linux/6.5.0-1024-azure

File hashes

Hashes for flake8_import_guard-0.1.5.tar.gz
Algorithm Hash digest
SHA256 b0fa2445a974a6728ca54f7b3fb7b67213acf3c4466767715c1aec9186b9cee3
MD5 fe1df501f1769e190d122eca112b3771
BLAKE2b-256 aae9808e18e6614ac6fabb1961d69c67ce7de04c02e31d68196906bb123f3b32

See more details on using hashes here.

File details

Details for the file flake8_import_guard-0.1.5-py3-none-any.whl.

File metadata

File hashes

Hashes for flake8_import_guard-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 acb3ec248b93a2fc471eb7b7f018047b7bc368ed21a48c8afe40f63f76cb6dbe
MD5 63a40f5644cc47dcd19796a3e5bddd22
BLAKE2b-256 8004042f515991481672192d28c2db3e237f833fcbb04f455bff160dfd892a6e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page