Metadata-Version: 1.0
Name: django-admin-honeypot
Version: 0.1.0
Summary: A fake Django admin login screen.
Home-page: https://github.com/dmpayton/django-admin-honeypot
Author: Derek Payton
Author-email: derek.payton@gmail.com
License: MIT License
Download-URL: https://github.com/dmpayton/django-admin-honeypot/tarball/v0.1.0
Description: # django-admin-honeypot
        
        django-admin-honeypot is fake Django admin login page that logs all attempts to login in the database. The purpose is to give administrators some insight into who is attempting to gain unauthorized access to their Django-powered website.
        
        * **Author**: [Derek Payton](http://dmpayton.com)
        * **Version**: 0.1.0
        * **License**: MIT
        
        ## Usage
        
        * Add `admin_honeypot` to `INSTALLED_APPS`.
        * Update your urls.py:
        
        ```
        urlpatterns = patterns(''
        ...
        url(r'^admin/', include('admin_honeypot.urls')),
        url(r'^secret/', include(admin.site.urls)),
        )
        ```
        
        ## Signals
        
        `admin_honeypot.signals.honeypot` is called on every login attempt with the following arguments:
        
        * **instance**: The LoginAttempt object created
        * **request**: The current request object
        
        ## Testing
        
        python manage.py test admin_honeypot
        
        Currently there is a single test that submits the fake login form and checks that the data was saved to the database.
        
Keywords: django admin honeypot trap
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Framework :: Django
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT License
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python
Classifier: Topic :: Internet :: WWW/HTTP :: Dynamic Content
