Skip to main content

Injector - Python dependency injection framework, inspired by Guice

Project description

image Coverage Status

Introduction

Dependency injection as a formal pattern is less useful in Python than in other languages, primarily due to its support for keyword arguments, the ease with which objects can be mocked, and its dynamic nature.

That said, a framework for assisting in this process can remove a lot of boiler-plate from larger applications. That’s where Injector can help. It automatically and transitively provides keyword arguments with their values. As an added benefit, Injector encourages nicely compartmentalised code through the use of Module s.

While being inspired by Guice, it does not slavishly replicate its API. Providing a Pythonic API trumps faithfulness.

How to get Injector?

Injector works with CPython 3.5+ and PyPy 3 implementing Python 3.5+.

A Quick Example

>>> from injector import Injector, inject
>>> class Inner:
...     def __init__(self):
...         self.forty_two = 42
...
>>> class Outer:
...     @inject
...     def __init__(self, inner: Inner):
...         self.inner = inner
...
>>> injector = Injector()
>>> outer = injector.get(Outer)
>>> outer.inner.forty_two
42

Or with dataclasses if you like:

from dataclasses import dataclass
from injector import Injector, inject
class Inner:
    def __init__(self):
        self.forty_two = 42

@inject
@dataclass
class Outer:
    inner: Inner

injector = Injector()
outer = injector.get(Outer)
print(outer.inner.forty_two)  # Prints 42

A Full Example

Here’s a full example to give you a taste of how Injector works:

>>> from injector import Module, Key, provider, Injector, inject, singleton

We’ll use an in-memory SQLite database for our example:

>>> import sqlite3

And make up an imaginary RequestHandler class that uses the SQLite connection:

>>> class RequestHandler:
...   @inject
...   def __init__(self, db: sqlite3.Connection):
...     self._db = db
...
...   def get(self):
...     cursor = self._db.cursor()
...     cursor.execute('SELECT key, value FROM data ORDER by key')
...     return cursor.fetchall()

Next, for the sake of the example, we’ll create a “configuration” annotated type:

>>> Configuration = Key('configuration')

Key is used to uniquely identify the configuration dictionary. Next, we bind the configuration to the injector, using a module:

>>> def configure_for_testing(binder):
...     configuration = {'db_connection_string': ':memory:'}
...     binder.bind(Configuration, to=configuration, scope=singleton)

Next we create a module that initialises the DB. It depends on the configuration provided by the above module to create a new DB connection, then populates it with some dummy data, and provides a Connection object:

>>> class DatabaseModule(Module):
...   @singleton
...   @provider
...   def provide_sqlite_connection(self, configuration: Configuration) -> sqlite3.Connection:
...     conn = sqlite3.connect(configuration['db_connection_string'])
...     cursor = conn.cursor()
...     cursor.execute('CREATE TABLE IF NOT EXISTS data (key PRIMARY KEY, value)')
...     cursor.execute('INSERT OR REPLACE INTO data VALUES ("hello", "world")')
...     return conn

(Note how we have decoupled configuration from our database initialisation code.)

Finally, we initialise an Injector and use it to instantiate a RequestHandler instance. This first transitively constructs a sqlite3.Connection object, and the Configuration dictionary that it in turn requires, then instantiates our RequestHandler:

>>> injector = Injector([configure_for_testing, DatabaseModule()])
>>> handler = injector.get(RequestHandler)
>>> tuple(map(str, handler.get()[0]))  # py3/py2 compatibility hack
('hello', 'world')

We can also verify that our Configuration and SQLite connections are indeed singletons within the Injector:

>>> injector.get(Configuration) is injector.get(Configuration)
True
>>> injector.get(sqlite3.Connection) is injector.get(sqlite3.Connection)
True

You’re probably thinking something like: “this is a large amount of work just to give me a database connection”, and you are correct; dependency injection is typically not that useful for smaller projects. It comes into its own on large projects where the up-front effort pays for itself in two ways:

  1. Forces decoupling. In our example, this is illustrated by decoupling our configuration and database configuration.

  2. After a type is configured, it can be injected anywhere with no additional effort. Simply @inject and it appears. We don’t really illustrate that here, but you can imagine adding an arbitrary number of RequestHandler subclasses, all of which will automatically have a DB connection provided.

Footnote

This framework is similar to snake-guice, but aims for simplification.

© Copyright 2010-2013 to Alec Thomas, under the BSD license

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

injector-0.16.2.tar.gz (17.0 kB view details)

Uploaded Source

Built Distribution

injector-0.16.2-py2.py3-none-any.whl (14.1 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file injector-0.16.2.tar.gz.

File metadata

  • Download URL: injector-0.16.2.tar.gz
  • Upload date:
  • Size: 17.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: Python-urllib/3.7

File hashes

Hashes for injector-0.16.2.tar.gz
Algorithm Hash digest
SHA256 c8181ed44b628956b5b2d92a2a83d0b302d0b185bc63c481fadfedaf91f745a4
MD5 0807de5a1e4f678956088d259bcc868e
BLAKE2b-256 873b832c345d5d2375b586c1a35307081fe29aed64bfafc6d241044df23bb78a

See more details on using hashes here.

File details

Details for the file injector-0.16.2-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for injector-0.16.2-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 555d119a8c74cf55fa973a480fc816c289dcf47dcef044bec61c5b06a0e1aeaa
MD5 0538af12ae2b990f1e1428bf592489b5
BLAKE2b-256 58b33b2d75a3f9e53b9cbf562f77e3ee24e361688ce92eed2d21cbae61b6a665

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page