Switch / Hijack User

Switch / Hijack User

The superuser in LAVA can be enabled to hijack or switch and work on behalf of other users without knowing their credentials. This comes handy when users report problems in their login and the superuser wants to reproduce it. This functionality is enabled by django-hijack module.


Once a user is hijacked by the superuser, the hijack remains in effect until the superuser logs out of the hijacked user in LAVA and logs back in.

django-hijack depends on django-compat and both these modules should be installed in order to enable this support. These packages are optional for lava and are not installed by default. They are available in Debian testing release as of now.

Install python-django-compat and python-django-hijack packages directly using apt if either of production-repo or staging-repo are configured already using images.validation.linaro.org See LAVA Archive signing key

In order to install manually, the LAVA team provides these Debian packages, which could be downloaded from the following URLs:

To enable hijack download the two packages and use the following commands to install them:

$ sudo dpkg -i python-django-compat_1.0.6-2_all.deb
$ sudo dpkg -i python-django-hijack_1.0.8-2_all.deb

Restart apache webserver for the changes to take effect:

$ sudo service apache2 restart

Hijack by calling URLs in the browser’s address bar

Users can be hijacked directly from the address bar by typing:


Replace example.com with your LAVA instance’s hostname.

Read more about django-hijack in https://github.com/arteria/django-hijack#django-hijack