plain 0.66.0__py3-none-any.whl → 0.68.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- plain/CHANGELOG.md +29 -0
- plain/chores/registry.py +1 -18
- plain/cli/agent/request.py +111 -120
- plain/cli/core.py +2 -2
- plain/cli/preflight.py +219 -98
- plain/cli/registry.py +1 -18
- plain/internal/middleware/hosts.py +0 -5
- plain/packages/registry.py +14 -0
- plain/preflight/README.md +5 -5
- plain/preflight/__init__.py +4 -24
- plain/preflight/checks.py +10 -0
- plain/preflight/files.py +17 -13
- plain/preflight/registry.py +64 -57
- plain/preflight/results.py +29 -0
- plain/preflight/security.py +58 -66
- plain/preflight/urls.py +7 -48
- plain/runtime/global_settings.py +9 -8
- plain/templates/jinja/__init__.py +2 -23
- plain/urls/patterns.py +21 -21
- plain/urls/resolvers.py +4 -4
- {plain-0.66.0.dist-info → plain-0.68.0.dist-info}/METADATA +1 -1
- {plain-0.66.0.dist-info → plain-0.68.0.dist-info}/RECORD +25 -24
- {plain-0.66.0.dist-info → plain-0.68.0.dist-info}/entry_points.txt +1 -0
- plain/preflight/messages.py +0 -81
- {plain-0.66.0.dist-info → plain-0.68.0.dist-info}/WHEEL +0 -0
- {plain-0.66.0.dist-info → plain-0.68.0.dist-info}/licenses/LICENSE +0 -0
plain/cli/preflight.py
CHANGED
@@ -1,126 +1,247 @@
|
|
1
|
+
import json
|
2
|
+
import sys
|
3
|
+
|
1
4
|
import click
|
2
5
|
|
3
6
|
from plain import preflight
|
4
7
|
from plain.packages import packages_registry
|
8
|
+
from plain.preflight.registry import checks_registry
|
9
|
+
from plain.runtime import settings
|
10
|
+
|
11
|
+
|
12
|
+
@click.group("preflight")
|
13
|
+
def preflight_cli():
|
14
|
+
"""Run or manage preflight checks."""
|
15
|
+
pass
|
5
16
|
|
6
17
|
|
7
|
-
@
|
8
|
-
@click.argument("package_label", nargs=-1)
|
18
|
+
@preflight_cli.command("check")
|
9
19
|
@click.option(
|
10
20
|
"--deploy",
|
11
21
|
is_flag=True,
|
12
22
|
help="Check deployment settings.",
|
13
23
|
)
|
14
24
|
@click.option(
|
15
|
-
"--
|
16
|
-
default="
|
17
|
-
type=click.Choice(["
|
18
|
-
help="
|
25
|
+
"--format",
|
26
|
+
default="text",
|
27
|
+
type=click.Choice(["text", "json"]),
|
28
|
+
help="Output format (default: text)",
|
19
29
|
)
|
20
30
|
@click.option(
|
21
|
-
"--
|
31
|
+
"--quiet",
|
22
32
|
is_flag=True,
|
23
|
-
help="
|
33
|
+
help="Hide progress output and warnings, only show errors.",
|
24
34
|
)
|
25
|
-
def
|
35
|
+
def check_command(deploy, format, quiet):
|
26
36
|
"""
|
27
37
|
Use the system check framework to validate entire Plain project.
|
28
|
-
|
29
|
-
If there are only light messages (like warnings), print them to stderr
|
30
|
-
and don't raise an exception.
|
38
|
+
Exit with error code if any errors are found. Warnings do not cause failure.
|
31
39
|
"""
|
32
|
-
|
40
|
+
# Auto-discover and load preflight checks
|
41
|
+
packages_registry.autodiscover_modules("preflight", include_app=True)
|
33
42
|
|
34
|
-
if
|
35
|
-
|
36
|
-
packages_registry.get_package_config(label) for label in package_label
|
37
|
-
]
|
38
|
-
else:
|
39
|
-
package_configs = None
|
43
|
+
if not quiet:
|
44
|
+
click.secho("Running preflight checks...", dim=True, italic=True, err=True)
|
40
45
|
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
+
total_checks = 0
|
47
|
+
passed_checks = 0
|
48
|
+
check_results = []
|
49
|
+
|
50
|
+
# Run checks and collect results
|
51
|
+
for check_class, check_name, issues in preflight.run_checks(
|
52
|
+
include_deploy_checks=deploy,
|
53
|
+
):
|
54
|
+
total_checks += 1
|
55
|
+
|
56
|
+
# Filter out silenced issues
|
57
|
+
visible_issues = [issue for issue in issues if not issue.is_silenced()]
|
58
|
+
|
59
|
+
# For text format, show real-time progress
|
60
|
+
if format == "text":
|
61
|
+
if not quiet:
|
62
|
+
# Print check name without newline
|
63
|
+
click.echo("Check:", nl=False, err=True)
|
64
|
+
click.secho(f"{check_name} ", bold=True, nl=False, err=True)
|
46
65
|
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
if preflight.ERROR <= e.level < preflight.CRITICAL and not e.is_silenced()
|
68
|
-
]
|
69
|
-
criticals = [
|
70
|
-
e
|
71
|
-
for e in all_issues
|
72
|
-
if preflight.CRITICAL <= e.level and not e.is_silenced()
|
73
|
-
]
|
74
|
-
sorted_issues = [
|
75
|
-
(criticals, "CRITICALS"),
|
76
|
-
(errors, "ERRORS"),
|
77
|
-
(warnings, "WARNINGS"),
|
78
|
-
(infos, "INFOS"),
|
79
|
-
(debugs, "DEBUGS"),
|
80
|
-
]
|
81
|
-
|
82
|
-
for issues, group_name in sorted_issues:
|
83
|
-
if issues:
|
84
|
-
visible_issue_count += len(issues)
|
85
|
-
formatted = (
|
86
|
-
click.style(str(e), fg="red")
|
87
|
-
if e.is_serious()
|
88
|
-
else click.style(str(e), fg="yellow")
|
89
|
-
for e in issues
|
66
|
+
# Determine status icon based on issue severity
|
67
|
+
if not visible_issues:
|
68
|
+
# No issues - passed
|
69
|
+
if not quiet:
|
70
|
+
click.secho("✔", fg="green", err=True)
|
71
|
+
passed_checks += 1
|
72
|
+
else:
|
73
|
+
# Has issues - determine icon based on highest severity
|
74
|
+
has_errors = any(not issue.warning for issue in visible_issues)
|
75
|
+
if not quiet:
|
76
|
+
if has_errors:
|
77
|
+
click.secho("✗", fg="red", err=True)
|
78
|
+
else:
|
79
|
+
click.secho("⚠", fg="yellow", err=True)
|
80
|
+
|
81
|
+
# Print issues with simple indentation
|
82
|
+
issues_to_show = (
|
83
|
+
visible_issues
|
84
|
+
if not quiet
|
85
|
+
else [issue for issue in visible_issues if not issue.warning]
|
90
86
|
)
|
91
|
-
|
92
|
-
|
87
|
+
for i, issue in enumerate(issues_to_show):
|
88
|
+
issue_color = "red" if not issue.warning else "yellow"
|
89
|
+
issue_type = "ERROR" if not issue.warning else "WARNING"
|
93
90
|
|
94
|
-
|
95
|
-
|
91
|
+
if quiet:
|
92
|
+
# In quiet mode, show check name once, then issues
|
93
|
+
if i == 0:
|
94
|
+
click.secho(f"{check_name}:", err=True)
|
95
|
+
# Show ID and fix on separate lines with same indentation
|
96
|
+
click.secho(
|
97
|
+
f" [{issue_type}] {issue.id}:",
|
98
|
+
fg=issue_color,
|
99
|
+
bold=True,
|
100
|
+
err=True,
|
101
|
+
nl=False,
|
102
|
+
)
|
103
|
+
click.secho(f" {issue.fix}", err=True, dim=True)
|
104
|
+
else:
|
105
|
+
# Show ID and fix on separate lines with same indentation
|
106
|
+
click.secho(
|
107
|
+
f" [{issue_type}] {issue.id}: ",
|
108
|
+
fg=issue_color,
|
109
|
+
bold=True,
|
110
|
+
err=True,
|
111
|
+
nl=False,
|
112
|
+
)
|
113
|
+
click.secho(f"{issue.fix}", err=True, dim=True)
|
114
|
+
else:
|
115
|
+
# For JSON format, just count passed checks
|
116
|
+
if not visible_issues:
|
117
|
+
passed_checks += 1
|
96
118
|
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
111
|
-
|
119
|
+
check_results.append((check_class, check_name, issues))
|
120
|
+
|
121
|
+
# Output results based on format
|
122
|
+
|
123
|
+
# Get all issues from check_results instead of maintaining separate list
|
124
|
+
all_issues = [issue for _, _, issues in check_results for issue in issues]
|
125
|
+
# Errors (non-warnings) cause preflight to fail
|
126
|
+
has_errors = any(
|
127
|
+
not issue.warning and not issue.is_silenced() for issue in all_issues
|
128
|
+
)
|
129
|
+
|
130
|
+
if format == "json":
|
131
|
+
# Build JSON output
|
132
|
+
results = {"passed": not has_errors, "checks": []}
|
133
|
+
|
134
|
+
for check_class, check_name, issues in check_results:
|
135
|
+
visible_issues = [issue for issue in issues if not issue.is_silenced()]
|
136
|
+
|
137
|
+
check_result = {
|
138
|
+
"name": check_name,
|
139
|
+
"passed": len(visible_issues) == 0,
|
140
|
+
"issues": [],
|
141
|
+
}
|
142
|
+
|
143
|
+
for issue in visible_issues:
|
144
|
+
issue_data = {
|
145
|
+
"id": issue.id,
|
146
|
+
"warning": issue.warning,
|
147
|
+
"fix": issue.fix,
|
148
|
+
"obj": str(issue.obj) if issue.obj is not None else None,
|
149
|
+
}
|
150
|
+
check_result["issues"].append(issue_data)
|
151
|
+
|
152
|
+
results["checks"].append(check_result)
|
153
|
+
|
154
|
+
click.echo(json.dumps(results, indent=2))
|
112
155
|
else:
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
156
|
+
# Text format summary
|
157
|
+
if not quiet:
|
158
|
+
click.echo()
|
159
|
+
|
160
|
+
# Calculate warning and error counts
|
161
|
+
warning_count = sum(
|
162
|
+
1
|
163
|
+
for _, _, issues in check_results
|
164
|
+
if issues
|
165
|
+
and not any(
|
166
|
+
not issue.warning for issue in issues if not issue.is_silenced()
|
122
167
|
)
|
123
|
-
|
124
|
-
|
168
|
+
)
|
169
|
+
error_count = sum(
|
170
|
+
1
|
171
|
+
for _, _, issues in check_results
|
172
|
+
if issues
|
173
|
+
and any(not issue.warning for issue in issues if not issue.is_silenced())
|
174
|
+
)
|
175
|
+
|
176
|
+
# Build colored summary parts
|
177
|
+
summary_parts = []
|
178
|
+
|
179
|
+
if passed_checks > 0:
|
180
|
+
summary_parts.append(click.style(f"{passed_checks} passed", fg="green"))
|
181
|
+
|
182
|
+
if warning_count > 0:
|
183
|
+
summary_parts.append(click.style(f"{warning_count} warnings", fg="yellow"))
|
184
|
+
|
185
|
+
if error_count > 0:
|
186
|
+
summary_parts.append(click.style(f"{error_count} errors", fg="red"))
|
187
|
+
|
188
|
+
# Show checkmark if successful (no errors)
|
189
|
+
if not has_errors:
|
190
|
+
icon = click.style("✔ ", fg="green")
|
191
|
+
summary_color = "green"
|
125
192
|
else:
|
126
|
-
|
193
|
+
icon = ""
|
194
|
+
summary_color = None
|
195
|
+
|
196
|
+
summary_text = ", ".join(summary_parts) if summary_parts else "no issues"
|
197
|
+
|
198
|
+
click.secho(f"{icon}{summary_text}", fg=summary_color, err=True)
|
199
|
+
|
200
|
+
# Exit with error if there are any errors (not warnings)
|
201
|
+
if has_errors:
|
202
|
+
sys.exit(1)
|
203
|
+
|
204
|
+
|
205
|
+
@preflight_cli.command("list")
|
206
|
+
def list_checks():
|
207
|
+
"""List all available preflight checks."""
|
208
|
+
packages_registry.autodiscover_modules("preflight", include_app=True)
|
209
|
+
|
210
|
+
regular = []
|
211
|
+
deployment = []
|
212
|
+
silenced_checks = settings.PREFLIGHT_SILENCED_CHECKS
|
213
|
+
|
214
|
+
for name, (check_class, deploy) in sorted(checks_registry.checks.items()):
|
215
|
+
# Use class docstring as description
|
216
|
+
description = check_class.__doc__ or "No description"
|
217
|
+
# Get first line of docstring
|
218
|
+
description = description.strip().split("\n")[0]
|
219
|
+
|
220
|
+
is_silenced = name in silenced_checks
|
221
|
+
if deploy:
|
222
|
+
deployment.append((name, description, is_silenced))
|
223
|
+
else:
|
224
|
+
regular.append((name, description, is_silenced))
|
225
|
+
|
226
|
+
if regular:
|
227
|
+
click.echo("Regular checks:")
|
228
|
+
for name, description, is_silenced in regular:
|
229
|
+
silenced_text = (
|
230
|
+
click.style(" (silenced)", fg="red", dim=True) if is_silenced else ""
|
231
|
+
)
|
232
|
+
click.echo(
|
233
|
+
f" {click.style(name)}: {click.style(description, dim=True)}{silenced_text}"
|
234
|
+
)
|
235
|
+
|
236
|
+
if deployment:
|
237
|
+
click.echo("\nDeployment checks:")
|
238
|
+
for name, description, is_silenced in deployment:
|
239
|
+
silenced_text = (
|
240
|
+
click.style(" (silenced)", fg="red", dim=True) if is_silenced else ""
|
241
|
+
)
|
242
|
+
click.echo(
|
243
|
+
f" {click.style(name)}: {click.style(description, dim=True)}{silenced_text}"
|
244
|
+
)
|
245
|
+
|
246
|
+
if not regular and not deployment:
|
247
|
+
click.echo("No preflight checks found.")
|
plain/cli/registry.py
CHANGED
@@ -1,6 +1,3 @@
|
|
1
|
-
from importlib import import_module
|
2
|
-
from importlib.util import find_spec
|
3
|
-
|
4
1
|
from plain.packages import packages_registry
|
5
2
|
|
6
3
|
|
@@ -18,21 +15,7 @@ class CLIRegistry:
|
|
18
15
|
"""
|
19
16
|
Import modules from installed packages and app to trigger registration.
|
20
17
|
"""
|
21
|
-
|
22
|
-
for package_config in packages_registry.get_package_configs():
|
23
|
-
import_name = f"{package_config.name}.cli"
|
24
|
-
try:
|
25
|
-
import_module(import_name)
|
26
|
-
except ModuleNotFoundError:
|
27
|
-
pass
|
28
|
-
|
29
|
-
# Import from app
|
30
|
-
import_name = "app.cli"
|
31
|
-
if find_spec(import_name):
|
32
|
-
try:
|
33
|
-
import_module(import_name)
|
34
|
-
except ModuleNotFoundError:
|
35
|
-
pass
|
18
|
+
packages_registry.autodiscover_modules("cli", include_app=True)
|
36
19
|
|
37
20
|
def get_commands(self):
|
38
21
|
"""
|
@@ -159,7 +159,6 @@ def validate_host(host: str, allowed_hosts: list[str]) -> bool:
|
|
159
159
|
Check that the host looks valid and matches a host or host pattern in the
|
160
160
|
given list of ``allowed_hosts``. Supported patterns:
|
161
161
|
|
162
|
-
- ``*`` matches anything
|
163
162
|
- ``.example.com`` matches a domain and all its subdomains
|
164
163
|
(e.g. ``example.com`` and ``sub.example.com``)
|
165
164
|
- ``example.com`` matches exactly that domain
|
@@ -176,10 +175,6 @@ def validate_host(host: str, allowed_hosts: list[str]) -> bool:
|
|
176
175
|
host_ip = parse_ip_address(host)
|
177
176
|
|
178
177
|
for pattern in allowed_hosts:
|
179
|
-
# Wildcard matches everything
|
180
|
-
if pattern == "*":
|
181
|
-
return True
|
182
|
-
|
183
178
|
# Check CIDR notation patterns using walrus operator
|
184
179
|
if network := parse_cidr_pattern(pattern):
|
185
180
|
if host_ip and host_ip in network:
|
plain/packages/registry.py
CHANGED
@@ -2,6 +2,7 @@ import sys
|
|
2
2
|
import threading
|
3
3
|
from collections import Counter
|
4
4
|
from importlib import import_module
|
5
|
+
from importlib.util import find_spec
|
5
6
|
|
6
7
|
from plain.exceptions import ImproperlyConfigured, PackageRegistryNotReady
|
7
8
|
|
@@ -188,6 +189,19 @@ class PackagesRegistry:
|
|
188
189
|
|
189
190
|
return package_config
|
190
191
|
|
192
|
+
def autodiscover_modules(self, module_name: str, *, include_app: bool) -> None:
|
193
|
+
def _import_if_exists(name):
|
194
|
+
if find_spec(name):
|
195
|
+
import_module(name)
|
196
|
+
|
197
|
+
# Load from all packages
|
198
|
+
for package_config in self.get_package_configs():
|
199
|
+
_import_if_exists(f"{package_config.name}.{module_name}")
|
200
|
+
|
201
|
+
# Load from app if requested
|
202
|
+
if include_app:
|
203
|
+
_import_if_exists(f"app.{module_name}")
|
204
|
+
|
191
205
|
|
192
206
|
packages_registry = PackagesRegistry(installed_packages=None)
|
193
207
|
|
plain/preflight/README.md
CHANGED
@@ -13,7 +13,7 @@
|
|
13
13
|
Preflight checks help identify issues with your settings or environment before running your application.
|
14
14
|
|
15
15
|
```bash
|
16
|
-
plain preflight
|
16
|
+
plain preflight check
|
17
17
|
```
|
18
18
|
|
19
19
|
## Development
|
@@ -22,10 +22,10 @@ If you use [`plain.dev`](/plain-dev/README.md) for local development, the Plain
|
|
22
22
|
|
23
23
|
## Deployment
|
24
24
|
|
25
|
-
The `plain preflight` command should often be part of your deployment process. Make sure to add the `--deploy` flag to the command to run checks that are only relevant in a production environment.
|
25
|
+
The `plain preflight check` command should often be part of your deployment process. Make sure to add the `--deploy` flag to the command to run checks that are only relevant in a production environment.
|
26
26
|
|
27
27
|
```bash
|
28
|
-
plain preflight --deploy
|
28
|
+
plain preflight check --deploy
|
29
29
|
```
|
30
30
|
|
31
31
|
## Custom preflight checks
|
@@ -51,11 +51,11 @@ def custom_deploy_check(package_configs, **kwargs):
|
|
51
51
|
|
52
52
|
## Silencing preflight checks
|
53
53
|
|
54
|
-
The `settings.PREFLIGHT_SILENCED_CHECKS` setting can be used to silence individual checks by their ID (ex. `security.
|
54
|
+
The `settings.PREFLIGHT_SILENCED_CHECKS` setting can be used to silence individual checks by their ID (ex. `security.E020`).
|
55
55
|
|
56
56
|
```python
|
57
57
|
# app/settings.py
|
58
58
|
PREFLIGHT_SILENCED_CHECKS = [
|
59
|
-
"security.
|
59
|
+
"security.E020", # Allow empty ALLOWED_HOSTS in deployment
|
60
60
|
]
|
61
61
|
```
|
plain/preflight/__init__.py
CHANGED
@@ -1,17 +1,6 @@
|
|
1
|
-
from .
|
2
|
-
CRITICAL,
|
3
|
-
DEBUG,
|
4
|
-
ERROR,
|
5
|
-
INFO,
|
6
|
-
WARNING,
|
7
|
-
CheckMessage,
|
8
|
-
Critical,
|
9
|
-
Debug,
|
10
|
-
Error,
|
11
|
-
Info,
|
12
|
-
Warning,
|
13
|
-
)
|
1
|
+
from .checks import PreflightCheck
|
14
2
|
from .registry import register_check, run_checks
|
3
|
+
from .results import PreflightResult
|
15
4
|
|
16
5
|
# Import these to force registration of checks
|
17
6
|
import plain.preflight.files # NOQA isort:skip
|
@@ -20,17 +9,8 @@ import plain.preflight.urls # NOQA isort:skip
|
|
20
9
|
|
21
10
|
|
22
11
|
__all__ = [
|
23
|
-
"
|
24
|
-
"
|
25
|
-
"Info",
|
26
|
-
"Warning",
|
27
|
-
"Error",
|
28
|
-
"Critical",
|
29
|
-
"DEBUG",
|
30
|
-
"INFO",
|
31
|
-
"WARNING",
|
32
|
-
"ERROR",
|
33
|
-
"CRITICAL",
|
12
|
+
"PreflightCheck",
|
13
|
+
"PreflightResult",
|
34
14
|
"register_check",
|
35
15
|
"run_checks",
|
36
16
|
]
|
plain/preflight/files.py
CHANGED
@@ -2,18 +2,22 @@ from pathlib import Path
|
|
2
2
|
|
3
3
|
from plain.runtime import settings
|
4
4
|
|
5
|
-
from . import
|
5
|
+
from .checks import PreflightCheck
|
6
|
+
from .registry import register_check
|
7
|
+
from .results import PreflightResult
|
6
8
|
|
7
9
|
|
8
|
-
@register_check
|
9
|
-
|
10
|
-
setting
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
10
|
+
@register_check("files.upload_temp_dir")
|
11
|
+
class CheckSettingFileUploadTempDir(PreflightCheck):
|
12
|
+
"""Validates that the FILE_UPLOAD_TEMP_DIR setting points to an existing directory."""
|
13
|
+
|
14
|
+
def run(self):
|
15
|
+
setting = settings.FILE_UPLOAD_TEMP_DIR
|
16
|
+
if setting and not Path(setting).is_dir():
|
17
|
+
return [
|
18
|
+
PreflightResult(
|
19
|
+
fix=f"FILE_UPLOAD_TEMP_DIR points to nonexistent directory '{setting}'. Create the directory or update the setting.",
|
20
|
+
id="files.upload_temp_dir_nonexistent",
|
21
|
+
)
|
22
|
+
]
|
23
|
+
return []
|