@@ -2309,7 +2309,7 @@ var SettingsModel = Backbone.Model.extend({
2309
2309
if ( ! _ . isUndefined ( login_cookie ) ) {
2310
2310
var piece = login_cookie . split ( ':' ) ;
2311
2311
var user = this . users . findWhere ( { username : piece [ 0 ] } ) ;
2312
- if ( ! _ . isUndefined ( user ) && user . get ( 'password_hash' ) === piece [ 1 ] ) {
2312
+ if ( ! _ . isUndefined ( user ) ) {
2313
2313
return user . get ( 'username' ) ;
2314
2314
}
2315
2315
else {
@@ -2359,16 +2359,10 @@ var SettingsModel = Backbone.Model.extend({
2359
2359
) ;
2360
2360
}
2361
2361
else {
2362
- if ( user . get ( 'password_hash' ) == password_hash ) {
2363
- $ . cookie ( 'login' , username + ':' + password_hash , { expires : 12 , path : '/' } ) ;
2364
- this . trigger ( 'logged_in' , user ) ;
2365
- }
2366
- else {
2367
- console . log ( 'Your hash was ' + password_hash ) ;
2368
- console . log ( 'Desired hash was ' + user . get ( 'password_hash' ) ) ;
2369
- console . log ( 'Username was ' + username ) ;
2370
- errorDialog ( 'Bad password. Check log for proper hash and edit user file.' ) ;
2371
- }
2362
+ // The fake, client-side password was causing more problems than it solved.
2363
+ // Carry the data forward, but don't enforce it.
2364
+ $ . cookie ( 'login' , username + ':' + password_hash , { expires : 12 , path : '/' } ) ;
2365
+ this . trigger ( 'logged_in' , user ) ;
2372
2366
}
2373
2367
2374
2368
} ,
0 commit comments