Skip to main content

Safely work with a production database in an insecure environment.

Project description



Safely work with a production database in an insecure environment. **django-devsafe** scrambles sensitive user data so that you don't accidentally expose the private information of your users during testing.

Quick start

0. Install django-devsafe

pip install django-devsafe

1. Add "devsafe" to your INSTALLED_APPS setting like this:


2. Optionally, you can use your settings file to define additional profile fields to scramble. Your User object must
have a **get_profile()** method to access these fields.

DEVSAFE_FIELDS = ['secret_payment_token', 'secret_api_key']

3. Invoke devsafe!

python devsafe


Usage: devsafe [options]

Scrambles your sensitive user data. By default, this just does email addresses and passwords. Omits superusers and staff.


/ devsafe

--dry Dry run, does not actually scramble data. Default
--quiet Be quiet. Default False.


Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for django-devsafe, version 0.3.0
Filename, size File type Python version Upload date Hashes
Filename, size django-devsafe-0.3.0.tar.gz (3.7 kB) File type Source Python version None Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page