diff options
author | Byron Jones <glob@mozilla.com> | 2014-11-04 15:40:34 +0100 |
---|---|---|
committer | Byron Jones <glob@mozilla.com> | 2014-11-04 15:40:34 +0100 |
commit | ede3ced0fa2b76a5fcf8770eee29a2e23d5189a9 (patch) | |
tree | 527db7cd4f722f315de1247ac77897fb24ad1d7c /relogin.cgi | |
parent | 64fc523d6feb517dae87d76ea8568f43b89e1547 (diff) | |
download | bugzilla-ede3ced0fa2b76a5fcf8770eee29a2e23d5189a9.tar.gz bugzilla-ede3ced0fa2b76a5fcf8770eee29a2e23d5189a9.tar.xz |
Bug 1093622: Backout bug 1090427 for causing: authenticated calls from bzapi are failing: 'Untrusted Authentication Request'
Diffstat (limited to 'relogin.cgi')
-rwxr-xr-x | relogin.cgi | 13 |
1 files changed, 0 insertions, 13 deletions
diff --git a/relogin.cgi b/relogin.cgi index 9eea67bd5..6eb798205 100755 --- a/relogin.cgi +++ b/relogin.cgi @@ -67,19 +67,6 @@ elsif ($action eq 'prepare-sudo') { # Keep a temporary record of the user visiting this page $vars->{'token'} = issue_session_token('sudo_prepared'); - if ($user->authorizer->can_login) { - my $value = generate_random_password(); - my %args; - $args{'-secure'} = 1 if Bugzilla->params->{ssl_redirect}; - - $cgi->send_cookie(-name => 'Bugzilla_login_request_cookie', - -value => $value, - -httponly => 1, - %args); - - $vars->{'login_request_token'} = issue_hash_token(['login_request', $value]); - } - # Show the sudo page $vars->{'target_login_default'} = $cgi->param('target_login'); $vars->{'reason_default'} = $cgi->param('reason'); |