Switch / Hijack User¶
The superuser in LAVA can be enabled to hijack or switch and work on behalf of other users without knowing their credentials. This comes handy when users report problems in their login and the superuser wants to reproduce it. This functionality is enabled by django-hijack module.
Note
Once a user is hijacked by the superuser, the hijack remains in effect until the superuser logs out of the hijacked user in LAVA and logs back in.
django-hijack depends on django-compat and both these modules should be installed in order to enable this support. These packages are optional for lava and are not installed by default. They are available in Debian testing release as of now.
Install python-django-compat and python-django-hijack packages directly using apt if either of production-repo or staging-repo are configured already using images.validation.linaro.org See LAVA Archive signing key
In order to install manually, the LAVA team provides these Debian packages, which could be downloaded from the following URLs:
To enable hijack download the two packages and use the following commands to install them:
$ sudo dpkg -i python-django-compat_1.0.6-2_all.deb
$ sudo dpkg -i python-django-hijack_1.0.8-2_all.deb
Restart apache webserver for the changes to take effect:
$ sudo service apache2 restart
Hijack by calling URLs in the browser’s address bar¶
Users can be hijacked directly from the address bar by typing:
Note
Replace example.com with your LAVA instance’s hostname.
Read more about django-hijack in https://github.com/arteria/django-hijack#django-hijack