Browse Source
[FIX] Use _compute_session_token to invalidate user sessions on auth_session_timeout
pull/1495/head
George Daramouskas
6 years ago
No known key found for this signature in database
GPG Key ID: 5B4EF742F8CD859C
1 changed files with
2 additions and
3 deletions
-
auth_session_timeout/models/res_users.py
|
@ -102,9 +102,8 @@ class ResUsers(models.Model): |
|
|
'Exception updating session file access/modified times.', |
|
|
'Exception updating session file access/modified times.', |
|
|
) |
|
|
) |
|
|
|
|
|
|
|
|
@classmethod |
|
|
|
|
|
def check(cls, *args, **kwargs): |
|
|
|
|
|
res = super(ResUsers, cls).check(*args, **kwargs) |
|
|
|
|
|
|
|
|
def _compute_session_token(self, sid): |
|
|
|
|
|
res = super(ResUsers, self)._compute_session_token(sid) |
|
|
if http.request: |
|
|
if http.request: |
|
|
http.request.env.user._auth_timeout_check() |
|
|
http.request.env.user._auth_timeout_check() |
|
|
return res |
|
|
return res |