Skip to main content

Injector - Python dependency injection framework, inspired by Guice

Project description

image

Introduction

Dependency injection as a formal pattern is less useful in Python than in other languages, primarily due to its support for keyword arguments, the ease with which objects can be mocked, and its dynamic nature.

That said, a framework for assisting in this process can remove a lot of boiler-plate from larger applications. That’s where Injector can help. It automatically and transitively provides keyword arguments with their values. As an added benefit, Injector encourages nicely compartmentalised code through the use of Module s.

While being inspired by Guice, it does not slavishly replicate its API. Providing a Pythonic API trumps faithfulness.

How to get Injector?

bash pip install injector

Injector works with CPython 2.6+/3.2+ and PyPy 1.9+.

Recent Notable Changes

If you inject a function, an injection-aware wrapper is provided

Example:

>>> from injector import Injector, inject, Key
>>> GreetingType = Key('GreetingType')
>>>
>>> @inject(greeting_type=GreetingType)
... def greet(greeting_type, who):
...     print('%s, %s!' % (greeting_type, who))
...
>>> def configure(binder):
...     binder.bind(GreetingType, to='Hello')
...
>>> injector = Injector(configure)
>>> greet_wrapper = injector.get(greet)
>>> greet_wrapper(who='John')
Hello, John!

A Quick Example

>>> from injector import Injector, inject
>>> class Inner(object):
...     def __init__(self):
...         self.forty_two = 42
...
>>> class Outer(object):
...     @inject(inner=Inner)
...     def __init__(self, inner):
...         self.inner = inner
...
>>> injector = Injector()
>>> outer = injector.get(Outer)
>>> outer.inner.forty_two
42

A Full Example

Here’s a full example to give you a taste of how Injector works:

>>> from injector import Module, Key, provides, Injector, inject, singleton

We’ll use an in-memory SQLite database for our example:

>>> import sqlite3

And make up an imaginary RequestHandler class that uses the SQLite connection:

>>> class RequestHandler(object):
...   @inject(db=sqlite3.Connection)
...   def __init__(self, db):
...     self._db = db
...
...   def get(self):
...     cursor = self._db.cursor()
...     cursor.execute('SELECT key, value FROM data ORDER by key')
...     return cursor.fetchall()

Next, for the sake of the example, we’ll create a “configuration” annotated type:

>>> Configuration = Key('configuration')

Key is used to uniquely identify the configuration dictionary. Next, we bind the configuration to the injector, using a module:

>>> def configure_for_testing(binder):
...     configuration = {'db_connection_string': ':memory:'}
...     binder.bind(Configuration, to=configuration, scope=singleton)

Next we create a module that initialises the DB. It depends on the configuration provided by the above module to create a new DB connection, then populates it with some dummy data, and provides a Connection object:

>>> class DatabaseModule(Module):
...   @singleton
...   @provides(sqlite3.Connection)
...   @inject(configuration=Configuration)
...   def provide_sqlite_connection(self, configuration):
...     conn = sqlite3.connect(configuration['db_connection_string'])
...     cursor = conn.cursor()
...     cursor.execute('CREATE TABLE IF NOT EXISTS data (key PRIMARY KEY, value)')
...     cursor.execute('INSERT OR REPLACE INTO data VALUES ("hello", "world")')
...     return conn

(Note how we have decoupled configuration from our database initialisation code.)

Finally, we initialise an Injector and use it to instantiate a RequestHandler instance. This first transitively constructs a sqlite3.Connection object, and the Configuration dictionary that it in turn requires, then instantiates our RequestHandler:

>>> injector = Injector([configure_for_testing, DatabaseModule()])
>>> handler = injector.get(RequestHandler)
>>> tuple(map(str, handler.get()[0]))  # py3/py2 compatibility hack
('hello', 'world')

We can also verify that our Configuration and SQLite connections are indeed singletons within the Injector:

>>> injector.get(Configuration) is injector.get(Configuration)
True
>>> injector.get(sqlite3.Connection) is injector.get(sqlite3.Connection)
True

You’re probably thinking something like: “this is a large amount of work just to give me a database connection”, and you are correct; dependency injection is typically not that useful for smaller projects. It comes into its own on large projects where the up-front effort pays for itself in two ways:

  1. Forces decoupling. In our example, this is illustrated by decoupling our configuration and database configuration.

  2. After a type is configured, it can be injected anywhere with no additional effort. Simply @inject and it appears. We don’t really illustrate that here, but you can imagine adding an arbitrary number of RequestHandler subclasses, all of which will automatically have a DB connection provided.

Footnote

This framework is similar to snake-guice, but aims for simplification.

© Copyright 2010-2013 to Alec Thomas, under the BSD license

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

injector-0.10.1.tar.gz (14.1 kB view details)

Uploaded Source

Built Distribution

injector-0.10.1-py2.py3-none-any.whl (16.9 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file injector-0.10.1.tar.gz.

File metadata

  • Download URL: injector-0.10.1.tar.gz
  • Upload date:
  • Size: 14.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for injector-0.10.1.tar.gz
Algorithm Hash digest
SHA256 82a1c964f0c19d1fb0de4aaa4ec0a1f43e968ad81e1cac31e9f322dfc89c9267
MD5 5ab18ecc2a3f097667f1abe1f989dd28
BLAKE2b-256 6a4a08de7c88dfcadac6011d65f3b498257c4974ac27b80d4901ad4fd07e9d4f

See more details on using hashes here.

File details

Details for the file injector-0.10.1-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for injector-0.10.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 c1d24d5d7eca8b2bca27ad4d270f8400c30e4774f46b13497ff7a218f165d3df
MD5 21f58c3d155f252958f6a70c6a30c6c2
BLAKE2b-256 50b0f54b1455ebe92cd683c849658827a5bec00bc072566560db5bd46e7330e4

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page