users: Delete or move home folder when user is deleted or renamed

On user deletion, user's home folder is also deleted. Admins have an
option to avoid deleting user's home by inactivating the user instead.

This commit also removes user deletion buttons from the user's list
page and adds this option to the user edit page. The user's edit form
asks for a confirmation if the user deletion is requested. This change
also means that the confirmation password is now required to delete a user.

Also:
  - Add a simple username validation to the privileged actions.
  - Functional tests: Create a fixture to login as an admin before every test.
  - Functional tests: Add a test to check that SSH passwordless login works
    after user is renamed to validate correct SSH related path permissions.
  - Privileged tests: Add `test_` prefix to the generated random string which
    makes easier to check and cleanup created home folders.
  - Minor quote fixes.

Tests performed in stable and testing containers:
  - Run all the users module tests twice, no failures in tests.
  - When user is the last admin, both "Active" and "Delete user"
    checkboxes are disabled.

Closes #2451.

[sunil]

- Refactor the JS code:

  - Ensure that DOM elements are lookup after DOM content is loaded.

  - Styling changes. Reduce the number of globals, name the global names
  somewhat more unique.

  - Click the button instead of submitting the form to disable the button.

- Template changes:

  - Add a body for the confirmation dialog to talk about disabling the user and
  deleting the home directory.

  - Change the label of the confirm button to make it more
  explicit (recommendation from many UX guides).

  - Styling.

- Functional tests:

  - Fix visibility checking of an element to use the correct splinter API.

  - Simplify clicking the edit user link.

- Minor update to form checkbox help text.

Signed-off-by: Veiko Aasa <veiko17@disroot.org>
Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org>
Reviewed-by: Sunil Mohan Adapa <sunil@medhas.org>
This commit is contained in:
Veiko Aasa 2024-10-17 17:36:14 +03:00 committed by Sunil Mohan Adapa
parent 0eac9c3260
commit f12e634bc9
No known key found for this signature in database
GPG Key ID: 43EA1CFF0AA7C5F2
12 changed files with 299 additions and 153 deletions

View File

@ -19,6 +19,7 @@ import plinth.forms
import plinth.modules.ssh.privileged as ssh_privileged
from plinth.modules import first_boot
from plinth.utils import is_user_admin
from plinth.views import messages_error
from . import get_last_admin_user, privileged
from .components import UsersAndGroups
@ -247,11 +248,18 @@ class UserUpdateForm(ValidNewUsernameCheckMixin, PasswordConfirmForm,
language = plinth.forms.LanguageSelectionFormMixin.language
delete = forms.BooleanField(
label=gettext_lazy('Delete user'), required=False,
help_text=gettext_lazy(
'Deleting the user account will also remove all the files '
'related to the user. Deleting files can be avoided by '
'setting the user account as inactive.'))
class Meta:
"""Metadata to control automatic form building."""
fields = ('username', 'email', 'groups', 'ssh_keys', 'language',
'is_active', 'confirm_password')
'is_active', 'delete', 'confirm_password')
model = User
widgets = {
'groups': plinth.forms.CheckboxSelectMultipleWithReadOnly(),
@ -274,6 +282,7 @@ class UserUpdateForm(ValidNewUsernameCheckMixin, PasswordConfirmForm,
if self.is_last_admin_user:
self.fields['is_active'].disabled = True
self.fields['delete'].disabled = True
def save(self, commit=True):
"""Update LDAP user name and groups after saving user model."""
@ -287,6 +296,19 @@ class UserUpdateForm(ValidNewUsernameCheckMixin, PasswordConfirmForm,
user.save()
self.save_m2m()
if self.cleaned_data.get('delete'):
try:
# Remove system user
privileged.remove_user(user.get_username(), auth_username,
confirm_password)
except Exception as error:
messages_error(self.request, _('Failed to delete user.'),
error)
else:
# Remove Django user
user.delete()
return user
old_groups = privileged.get_user_groups(self.username)
old_groups = [group for group in old_groups if group]

View File

@ -3,6 +3,7 @@
import logging
import os
import pathlib
import re
import shutil
import subprocess
@ -45,6 +46,12 @@ def _validate_password(username, password):
raise PermissionError('Invalid credentials')
def _validate_username(username):
"""Validate username."""
if pathlib.Path(username).parts[-1] != username:
raise ValueError('Invalid username')
@privileged
def first_setup():
"""Perform initial setup of LDAP."""
@ -277,8 +284,7 @@ def _configure_ldapscripts():
def _lock_ldap_user(username: str):
"""Lock user."""
if not _get_user_ids(username):
# User not found
if not _user_exists(username):
return None
# Replace command adds the attribute if it doesn't exist.
@ -286,13 +292,12 @@ def _lock_ldap_user(username: str):
replace: pwdAccountLockedTime
pwdAccountLockedTime: 000001010000Z
'''
_run(["ldapmodifyuser", username], input=input.encode())
_run(['ldapmodifyuser', username], input=input.encode())
def _unlock_ldap_user(username: str):
"""Unlock user."""
if not _get_user_ids(username):
# User not found
if not _user_exists(username):
return None
# Replace command without providing a value will remove the attribute
@ -344,41 +349,83 @@ def _disconnect_samba_user(username):
raise
def _get_user_home(username):
"""Return the user home directory."""
output = subprocess.check_output(['getent', 'passwd', username], text=True)
return pathlib.Path(output.split(':')[5])
@privileged
def create_user(username: str, password: secret_str,
auth_user: str | None = None,
auth_password: secret_str | None = None):
"""Create an LDAP user, set password and flush cache."""
_validate_username(username)
_validate_user(auth_user, auth_password)
_run(['ldapadduser', username, 'users'])
_set_user_password(username, password)
_flush_cache()
_set_samba_user(username, password)
@privileged
def remove_user(username: str, password: secret_str | None = None):
def remove_user(username: str, auth_user: str, auth_password: secret_str):
"""Remove an LDAP user."""
_validate_username(username)
_validate_user(auth_user, auth_password)
groups = _get_user_groups(username)
# require authentication if the user is last admin user
if _get_group_users('admin') == [username]:
_validate_password(username, password)
_delete_samba_user(username)
for group in groups:
_remove_user_from_group(username, group)
_run(['ldapdeleteuser', username])
if _user_exists(username):
# remove the home folder if it's owned by the user
home_folder = _get_user_home(username)
if home_folder.is_dir():
try:
owner = home_folder.owner()
except KeyError: # owner not found
pass
else:
if owner == username:
shutil.rmtree(home_folder, ignore_errors=True)
_run(['ldapdeleteuser', username])
_flush_cache()
def _rename_ldap_user(old_username: str, new_username: str,
new_home: pathlib.Path | None):
"""Rename LDAP user and user parameters."""
_run(['ldaprenameuser', old_username, new_username])
input = f'''changetype: modify
replace: cn
cn: {new_username}
-
replace: gecos
gecos: {new_username}
'''
if new_home:
input += f'''-
replace: homeDirectory
homeDirectory: {str(new_home)}
'''
_run(['ldapmodifyuser', new_username], input=input.encode())
@privileged
def rename_user(old_username: str, new_username: str):
"""Rename an LDAP user."""
_validate_username(old_username)
_validate_username(new_username)
groups = _get_user_groups(old_username)
_delete_samba_user(old_username)
@ -386,7 +433,16 @@ def rename_user(old_username: str, new_username: str):
for group in groups:
_remove_user_from_group(old_username, group)
_run(['ldaprenameuser', old_username, new_username])
old_home = _get_user_home(old_username)
new_home = old_home.with_name(new_username)
if new_home.exists():
new_home = None # Do not rename home
else:
if old_home.is_dir():
old_home.rename(new_home)
_rename_ldap_user(old_username, new_username, new_home)
for group in groups:
_add_user_to_group(new_username, group)
@ -465,6 +521,11 @@ def _get_user_ids(username: str) -> str | None:
return process.stdout.decode().strip()
def _user_exists(username):
"""Return whether the user exists."""
return _get_user_ids(username) is not None
def _get_group_users(groupname):
"""Return list of members in the group."""
try:

View File

@ -0,0 +1,60 @@
// SPDX-License-Identifier: AGPL-3.0-or-later
/**
* @licstart The following is the entire license notice for the JavaScript
* code in this page.
*
* This file is part of FreedomBox.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* @licend The above is the entire license notice for the JavaScript code
* in this page.
*/
var deleteConfirmed = false;
document.addEventListener('DOMContentLoaded', (event) => {
const form = document.querySelector('form.form-update');
form.addEventListener('submit', onUserUpdateSubmit);
const confirmDeleteButton = document.querySelector(
'#user-delete-confirm-dialog button.confirm');
confirmDeleteButton.addEventListener('click', () => {
onUserDeleteConfirmed(form);
});
});
// Show the confirmation dialog if the delete checkbox is selected
function onUserUpdateSubmit(event) {
const deleteUserCheckbox = document.getElementById('id_delete');
if (!deleteUserCheckbox.checked) {
return;
}
if (deleteConfirmed) { // Deletion is already confirmed
deleteConfirmed = false;
return;
}
event.preventDefault();
$("#user-delete-confirm-dialog").modal('show');
};
// Submit the user edit form
function onUserDeleteConfirmed(form) {
deleteConfirmed = true;
$('#user-delete-confirm-dialog').modal('hide');
// Click instead of submit to disable the submission button
form.querySelector('input[type=submit]').click();
};

View File

@ -1,26 +0,0 @@
{% extends "base.html" %}
{% comment %}
# SPDX-License-Identifier: AGPL-3.0-or-later
{% endcomment %}
{% load bootstrap %}
{% load i18n %}
{% block content %}
<h3>{% trans "Delete User" %}</h3>
<p>
{% blocktrans trimmed with username=object.username %}
Delete user <strong>{{ username }}</strong> permanently?
{% endblocktrans %}
</p>
<form class="form form-delete" method="post">
{% csrf_token %}
<input type="submit" class="btn btn-md btn-danger"
value="{% blocktrans with username=object.username %}Delete {{ username }}{% endblocktrans %}"/>
</form>
{% endblock %}

View File

@ -19,8 +19,8 @@
</div>
<div class="row">
<div class="col-md-6">
<div class="list-group list-group-two-column">
<div class="col-md-4">
<div class="list-group">
{% for user in object_list %}
<div class="list-group-item">
<a class='user-edit-label primary'
@ -34,15 +34,6 @@
aria-hidden="true"></span>
{% endif %}
{% if user.username != last_admin_user %}
<a href="{% url 'users:delete' user.username %}"
class="btn btn-default btn-sm secondary"
role="button"
title="{% blocktrans with username=user.username %}Delete user {{ username }}{% endblocktrans %}">
<span class="fa fa-trash-o"
aria-hidden="true"></span>
</a>
{% endif %}
</div>
{% endfor %}
</div>

View File

@ -5,6 +5,7 @@
{% load bootstrap %}
{% load i18n %}
{% load static %}
{% block content %}
<h3>
@ -30,5 +31,42 @@
<input type="submit" class="btn btn-primary"
value="{% trans "Save Changes" %}"/>
</form>
<div id="user-delete-confirm-dialog" class="modal" tabindex="-1"
role="dialog">
<div class="modal-dialog modal-dialog-centered" role="document">
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title">
{% blocktrans trimmed with username=object.username %}
Delete user <em>{{ username }}</em> and all the user's files?
{% endblocktrans %}
</h5>
<button type="button" class="close" data-dismiss="modal"
aria-label="{% trans 'Close' %}">
<span aria-hidden="true">&times;</span>
</button>
</div>
<div class="modal-body">
{% blocktrans trimmed %}
Deleting a user account also removes all the files user's home
directory. If you wish to keep these files, disable the user account
instead.
{% endblocktrans %}
</div>
<div class="modal-footer">
<button type="button" class="btn btn-danger confirm">
{% trans "Delete user and files" %}
</button>
<button type="button" class="btn btn-secondary" data-dismiss="modal">
{% trans "Cancel" %}
</button>
</div>
</div>
</div>
</div>
{% endblock %}
{% block page_js %}
<script type="text/javascript" src="{% static 'users/users.js' %}"></script>
{% endblock %}

View File

@ -54,16 +54,21 @@ _config_page_title_language_map = {
@pytest.fixture(scope='module', autouse=True)
def fixture_background(session_browser):
"""Unset language."""
yield
functional.login(session_browser)
functional.user_set_language(session_browser, _language_codes['None'])
@pytest.fixture(scope='function', autouse=True)
def fixture_login(session_browser):
"""Login."""
functional.login(session_browser)
yield
functional.user_set_language(session_browser, _language_codes['None'])
def test_create_user(session_browser):
"""Test creating a user."""
if functional.user_exists(session_browser, 'alice'):
functional.delete_user(session_browser, 'alice')
_delete_user(session_browser, 'alice')
functional.create_user(session_browser, 'alice', email='alice@example.com')
assert functional.user_exists(session_browser, 'alice')
@ -73,8 +78,7 @@ def test_create_user(session_browser):
def test_rename_user(session_browser):
"""Test renaming a user."""
_non_admin_user_exists(session_browser, 'alice')
if functional.user_exists(session_browser, 'bob'):
functional.delete_user(session_browser, 'bob')
_delete_user(session_browser, 'bob')
_rename_user(session_browser, 'alice', 'bob')
assert not functional.user_exists(session_browser, 'alice')
@ -94,7 +98,6 @@ def test_non_admin_users_can_change_own_ssh_keys(session_browser):
'alice')
_set_ssh_keys(session_browser, 'somekey456')
assert _get_ssh_keys(session_browser) == 'somekey456'
functional.login(session_browser)
def test_admin_users_can_change_other_users_ssh_keys(session_browser):
@ -121,6 +124,26 @@ def test_users_can_connect_passwordless_over_ssh(session_browser,
_should_connect_passwordless_over_ssh(session_browser, tmp_path_factory)
def test_ssh_passwordless_after_user_rename(session_browser, tmp_path_factory):
"""Test that users can connect passwordless after user is renamed."""
username_old = 'bob'
username_new = 'bob2'
functional.app_enable(session_browser, 'ssh')
_non_admin_user_exists(session_browser, username_old,
groups=['freedombox-ssh'])
_delete_user(session_browser, username_new)
_configure_ssh_keys(session_browser, tmp_path_factory,
username=username_old)
_should_connect_passwordless_over_ssh(session_browser, tmp_path_factory,
username=username_old)
_rename_user(session_browser, username_old, username_new)
assert functional.user_exists(session_browser, username_new)
_should_connect_passwordless_over_ssh(session_browser, tmp_path_factory,
username=username_new)
def test_users_cannot_connect_passwordless_over_ssh(session_browser,
tmp_path_factory):
"""Test that users cannot connect passwordless over ssh if the keys aren't
@ -173,8 +196,6 @@ def test_user_states(session_browser, tmp_path_factory):
_should_connect_passwordless_over_ssh(session_browser, tmp_path_factory,
username=username)
functional.login(session_browser)
def test_admin_users_can_change_own_password(session_browser):
"""Test that admin users can change their own password."""
@ -183,7 +204,6 @@ def test_admin_users_can_change_own_password(session_browser):
'testadmin')
_change_password(session_browser, 'newpassword456')
_can_log_in_with_password(session_browser, 'testadmin', 'newpassword456')
functional.login(session_browser)
def test_admin_users_can_change_others_password(session_browser):
@ -191,7 +211,6 @@ def test_admin_users_can_change_others_password(session_browser):
_non_admin_user_exists(session_browser, 'alice')
_change_password(session_browser, 'secretsecret567', username='alice')
_can_log_in_with_password(session_browser, 'alice', 'secretsecret567')
functional.login(session_browser)
def test_non_admin_users_can_change_own_password(session_browser):
@ -201,7 +220,6 @@ def test_non_admin_users_can_change_own_password(session_browser):
'alice')
_change_password(session_browser, 'newpassword123')
_can_log_in_with_password(session_browser, 'alice', 'newpassword123')
functional.login(session_browser)
def test_delete_user(session_browser):
@ -211,15 +229,19 @@ def test_delete_user(session_browser):
assert not functional.user_exists(session_browser, 'alice')
def _admin_user_exists(session_browser, name):
def _delete_user(session_browser, name):
"""Delete a user."""
if functional.user_exists(session_browser, name):
functional.delete_user(session_browser, name)
def _admin_user_exists(session_browser, name):
_delete_user(session_browser, name)
functional.create_user(session_browser, name, groups=['admin'])
def _non_admin_user_exists(session_browser, name, groups=[]):
if functional.user_exists(session_browser, name):
functional.delete_user(session_browser, name)
_delete_user(session_browser, name)
functional.create_user(session_browser, name, groups=groups)

View File

@ -36,17 +36,17 @@ def _is_ldap_set_up():
pytestmark: list[pytest.MarkDecorator] = [
pytest.mark.usefixtures('needs_root', 'load_cfg', 'mock_privileged'),
pytest.mark.skipif(not _is_ldap_set_up(), reason="LDAP is not configured")
pytest.mark.skipif(not _is_ldap_set_up(), reason='LDAP is not configured')
]
privileged_modules_to_mock = [
'plinth.modules.users.privileged', 'plinth.modules.security.privileged'
]
def _random_string(length=8):
def _random_string():
"""Return a random string created from lower case ascii."""
return ''.join(
[random.choice(string.ascii_lowercase) for _ in range(length)])
random_chars = [random.choice(string.ascii_lowercase) for _ in range(8)]
return 'test_' + ''.join(random_chars)
def _get_password_hash(username):
@ -135,11 +135,8 @@ def _create_user(username=None, groups=None):
def _delete_user(username):
"""Utility to delete an LDAP and Samba user"""
admin_password = None
if privileged.get_group_users('admin') == [username]:
_, admin_password = _get_admin_user_password()
privileged.remove_user(username, admin_password)
admin_user, admin_password = _get_admin_user_password()
privileged.remove_user(username, admin_user, admin_password)
def _create_admin_if_does_not_exist():
@ -195,6 +192,13 @@ def test_create_user():
_create_user(username)
def test_create_invalid_user():
"""Test invalid username validation."""
username = 'invalid/user'
with pytest.raises(ValueError):
_create_user(username)
def test_change_user_password():
"""Test changing user password."""
_create_admin_if_does_not_exist()
@ -293,6 +297,18 @@ def test_rename_user():
_rename_user(existing_user, new_username=new_username)
def test_rename_invalid_user():
"""Test rename invalid username"""
invalid_username = 'invalid/user'
valid_username = _random_string()
with pytest.raises(ValueError):
_rename_user(invalid_username, new_username=valid_username)
with pytest.raises(ValueError):
_rename_user(valid_username, new_username=invalid_username)
def test_delete_user():
"""Test to check whether LDAP users can be deleted"""
_create_admin_if_does_not_exist()
@ -313,10 +329,17 @@ def test_delete_user():
def test_delete_non_existent_user():
"""Deleting a non-existent user should fail."""
"""Deleting a non-existent user doesn't fail."""
non_existent_user = _random_string()
with pytest.raises(subprocess.CalledProcessError):
privileged.remove_user(non_existent_user)
_delete_user(non_existent_user)
def test_delete_invalid_user():
"""Deleting invalid username should fail."""
invalid_username = 'invalid/user'
with pytest.raises(ValueError):
_delete_user(invalid_username)
def test_groups():

View File

@ -84,15 +84,14 @@ def make_request(request, view, as_admin=True, **kwargs):
def test_users_list_view(rf):
"""Test that users list view has correct view data."""
"""Test users list view has correct view data."""
with (patch('plinth.views.AppView.get_context_data',
return_value={'is_enabled': True}),
patch('plinth.views.AppView.app', return_value=None)):
view = views.UserList.as_view()
response, messages = make_request(rf.get('/'), view)
assert response.context_data['last_admin_user'] == 'admin'
assert response.status_code == 200
assert response.status_code == 200
@pytest.mark.parametrize('username', ['test-new', 'test-neW@2_'])
@ -268,10 +267,15 @@ def test_update_user_without_permissions_view(rf):
def test_delete_user_view(rf):
"""Test that user deletion succeeds."""
user = 'tester'
form_data = {
'username': user,
'delete': True,
'confirm_password': 'adminpassword',
}
url = urls.reverse('users:delete', kwargs={'slug': user})
request = rf.post(url)
view = views.UserDelete.as_view()
url = urls.reverse('users:edit', kwargs={'slug': user})
request = rf.post(url, data=form_data)
view = views.UserUpdate.as_view()
response, messages = make_request(request, view, as_admin=True, slug=user)
assert list(messages)[0].message == 'User {} deleted.'.format(user)

View File

@ -16,8 +16,6 @@ urlpatterns = [
re_path(r'^sys/users/create/$', views.UserCreate.as_view(), name='create'),
re_path(r'^sys/users/(?P<slug>[\w.@+-]+)/edit/$',
non_admin_view(views.UserUpdate.as_view()), name='edit'),
re_path(r'^sys/users/(?P<slug>[\w.@+-]+)/delete/$',
views.UserDelete.as_view(), name='delete'),
re_path(r'^sys/users/(?P<slug>[\w.@+-]+)/change_password/$',
non_admin_view(views.UserChangePassword.as_view()),
name='change_password'),

View File

@ -2,17 +2,14 @@
"""Django views for user app."""
import django.views.generic
from django.contrib import messages
from django.contrib.auth import update_session_auth_hash
from django.contrib.auth.models import User
from django.contrib.messages.views import SuccessMessageMixin
from django.core.exceptions import PermissionDenied
from django.http import HttpResponseRedirect
from django.urls import reverse, reverse_lazy
from django.utils.translation import gettext as _
from django.utils.translation import gettext_lazy
from django.views.generic.edit import (CreateView, DeleteView, FormView,
UpdateView)
from django.views.generic.edit import (CreateView, FormView, UpdateView)
import plinth.modules.ssh.privileged as ssh_privileged
from plinth import translation
@ -20,7 +17,7 @@ from plinth.modules import first_boot
from plinth.utils import is_user_admin
from plinth.views import AppView
from . import get_last_admin_user, privileged
from . import privileged
from .forms import (CreateUserForm, FirstBootForm, UserChangePasswordForm,
UserUpdateForm)
@ -64,11 +61,6 @@ class UserList(AppView, ContextMixin, django.views.generic.ListView):
title = gettext_lazy('Users')
app_id = 'users'
def get_context_data(self, *args, **kwargs):
context = super().get_context_data(*args, **kwargs)
context['last_admin_user'] = get_last_admin_user()
return context
class UserUpdate(ContextMixin, SuccessMessageMixin, UpdateView):
"""View to update a user's details."""
@ -113,7 +105,13 @@ class UserUpdate(ContextMixin, SuccessMessageMixin, UpdateView):
def form_valid(self, form):
"""Set the user language if necessary."""
is_user_deleted = form.cleaned_data.get('delete')
if is_user_deleted:
self.success_message = gettext_lazy('User %(username)s deleted.')
response = super().form_valid(form)
if is_user_deleted:
return HttpResponseRedirect(reverse_lazy('users:index'))
# If user is updating their own profile then set the language for
# current session too.
@ -124,59 +122,6 @@ class UserUpdate(ContextMixin, SuccessMessageMixin, UpdateView):
return response
class UserDelete(ContextMixin, DeleteView):
"""Handle deleting users, showing a confirmation dialog first.
On GET, display a confirmation page.
On POST, delete the user.
"""
template_name = 'users_delete.html'
model = User
slug_field = 'username'
success_url = reverse_lazy('users:index')
title = gettext_lazy('Delete User')
def __init__(self, *args, **kwargs):
"""Initialize view, override delete method."""
super().__init__(*args, **kwargs)
# Avoid a warning with Django 4.0 that delete member should not be
# overridden. Remove this line and _delete() after Django 4.0 reaches
# Debian Stable.
self.delete = self._delete
def _delete_from_ldap(self):
"""Remove user from LDAP and show a success/error message."""
message = _('User {user} deleted.').format(user=self.kwargs['slug'])
messages.success(self.request, message)
try:
privileged.remove_user(self.kwargs['slug'])
except Exception:
messages.error(self.request, _('Deleting LDAP user failed.'))
def _delete(self, *args, **kwargs):
"""Set the success message of deleting the user.
The SuccessMessageMixin doesn't work with the DeleteView on Django1.7,
so set the success message manually here.
"""
output = super().delete(*args, **kwargs)
self._delete_from_ldap()
return output
def form_valid(self, form):
"""Perform additional operations after delete.
Since Django 4.0, DeleteView inherits form_view and a call to delete()
is not made.
"""
response = super().form_valid(form) # NOQA, pylint: disable=no-member
self._delete_from_ldap()
return response
class UserChangePassword(ContextMixin, SuccessMessageMixin, FormView):
"""View to change user password."""

View File

@ -664,12 +664,20 @@ def create_user(browser, name, password=None, groups=[], email=None):
def delete_user(browser, name):
"""Delete a user."""
nav_to_module(browser, 'users')
delete_link = browser.links.find_by_href(
f'/plinth/sys/users/{name}/delete/')
browser.links.find_by_href(f'/plinth/sys/users/{name}/edit/').first.click()
with wait_for_page_update(browser):
delete_link.first.click()
submit(browser, form_class='form-delete')
browser.find_by_id('id_delete').check()
browser.find_by_id('id_confirm_password').fill(
config['DEFAULT']['password'])
browser.find_by_css('.form-update input[type=submit]').first.click()
confirm_button = browser.find_by_css(
'#user-delete-confirm-dialog button.confirm').first
eventually(lambda: confirm_button.visible)
assert confirm_button.visible
with wait_for_page_update(browser, expected_url='/plinth/sys/users/'):
confirm_button.click()
def user_exists(browser, name):