Skip to content

Commit 4dc3eb5

Browse files
authored
Fix SuspiciousOperation issue in middle (#221)
* Fixes SuspiciousOperation issue * Update CHANGES * Expire mismatch `expire` was being pulled from `session` instead of `saml_session`. This mismatch causes an issue when `SESSION_SAVE_EVERY_REQUEST` is `True`.
1 parent 997be32 commit 4dc3eb5

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

CHANGES

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,10 @@
11
Changes
22
=======
33

4+
TBD (TBD)
5+
-------------------
6+
- Fixed SuspiciousOperation issue in middleware (Issue #220)
7+
48
0.40.1 (2020-xx-yy)
59
-------------------
610
- [BugFix] HTTP-REDIRECT Authn Requests with optional signature now works.

djangosaml2/middleware.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,11 @@ def process_response(self, request, response):
4343
patch_vary_headers(response, ('Cookie',))
4444
# relies and the global one
4545
if (modified or settings.SESSION_SAVE_EVERY_REQUEST) and not empty:
46-
if request.session.get_expire_at_browser_close():
46+
if request.saml_session.get_expire_at_browser_close():
4747
max_age = None
4848
expires = None
4949
else:
50-
max_age = getattr(request, self.cookie_name).get_expiry_age()
50+
max_age = request.saml_session.get_expiry_age()
5151
expires_time = time.time() + max_age
5252
expires = http_date(expires_time)
5353
# Save the session data and refresh the client cookie.

0 commit comments

Comments
 (0)