Skip to main content

No project description provided

Project description

Django Integrity

Django Integrity contains tools for controlling deferred constraints and handling IntegrityErrors in Django projects which use PostgreSQL.

Deferrable constraints

Some PostgreSQL constraints can be defined as DEFERRABLE. A constraint that is not deferred will be checked immediately after every command. A deferred constraint check will be postponed until the end of the transaction. A deferrable constraint will default to either DEFERRED or IMMEDIATE.

The utilities in django_integrity.constraints can ensure a deferred constraint is checked immediately, or defer an immediate constraint.

These alter the state of constraints until the end of the current transaction:

  • set_all_immediate(using=...)
  • set_immedate(names=(...), using=...)
  • set_deferred(names=(...), using=...)

To enforce a constraint immediately within some limited part of a transaction, use the immediate(names=(...), using=...) context manager.

Why do we need this?

This is most likely to be useful when you want to catch a foreign-key violation (i.e.: you have inserted a row which references different row which doesn't exist).

Django's foreign key constraints are deferred by default, so they would normally raise an error only at the end of a transaction. Using try to catch an IntegrityError from a foreign-key violation wouldn't work, and you'd need to wrap the COMMIT instead, which is trickier.

By making the constraint IMMEDIATE, the constraint would be checked on INSERT, and it would be much easier to catch.

More generally, if you have a custom deferrable constraint, it may be useful to change the default behaviour with these tools.

Refining IntegrityError

The refine_integrity_error context manager in django_integrity.conversion will convert an IntegrityError into a more specific exception based on a mapping of rules to your custom exceptions, and will raise the IntegrityError if it doesn't match.

Why do we need this?

When a database constraint is violated, we usually expect to see an IntegrityError.

Sometimes we need more information about the error: was it a unique constraint violation, or a check-constraint, or a not-null constraint? Perhaps we ran out of 32-bit integers for our ID column? Failing to be specific on these points could lead to bugs where we catch an exception without realising it was not the one we expected.

Example

from django_integrity import conversion
from users.models import User


class UserAlreadyExists(Exception): ...
class EmailCannotBeNull(Exception): ...
class EmailMustBeLowerCase(Exception): ...


def create_user(email: str) -> User:
    """
    Creates a user with the provided email address.

    Raises:
        UserAlreadyExists: If the email was not unique.
        EmailCannotBeNull: If the email was None.
        EmailMustBeLowerCase: If the email had a non-lowercase character.
    """
    rules = {
        conversion.Unique(model=User, fields=("email",)): UserAlreadyExists,
        conversion.NotNull(model=User, field="email"): EmailCannotBeNull,
        conversion.Named(name="constraint_islowercase"): EmailMustBeLowerCase,
    }
    with conversion.refine_integrity_error(rules):
        User.objects.create(email=email)

Supported dependencies

This package is tested against:

  • Python 3.10, 3.11, or 3.12.
  • Django 4.1, 4.2, or 5.0.
  • PostgreSQL 12 to 16.
  • psycopg2 and psycopg3.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

django_integrity-0.1.0.tar.gz (10.1 kB view details)

Uploaded Source

Built Distribution

django_integrity-0.1.0-py3-none-any.whl (8.9 kB view details)

Uploaded Python 3

File details

Details for the file django_integrity-0.1.0.tar.gz.

File metadata

  • Download URL: django_integrity-0.1.0.tar.gz
  • Upload date:
  • Size: 10.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.0.0 CPython/3.12.3

File hashes

Hashes for django_integrity-0.1.0.tar.gz
Algorithm Hash digest
SHA256 e35b5941fc49f947d7a0b310d318bdc509edf8e9a3bfe73c44da6eedae8babce
MD5 126512abfe1e6e8299892a0426d01c0f
BLAKE2b-256 a9008d7b6dc7b1a55a09544209c7329a6c7eedf7ddcd209e637973155d50039c

See more details on using hashes here.

File details

Details for the file django_integrity-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for django_integrity-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b29f8aa158a8895ec9f4c8deea1222bc1d69f7d55d714c333311366ace357107
MD5 5b4275439a07fc68166f1d8744d0812d
BLAKE2b-256 815650b0630b232b4253898154359cb5e3eb94ded18c680ba3536676ac49a795

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page