From: justdave%syndicomm.com <> Date: Thu, 18 Mar 2004 17:01:34 +0000 (+0000) Subject: Bug 237864: clean up leftovers from the bug 192516 checkin (some occurances of Token... X-Git-Tag: bugzilla-2.18rc1~176 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=cbef267df28e3befd53e6982773558c5acafd661;p=thirdparty%2Fbugzilla.git Bug 237864: clean up leftovers from the bug 192516 checkin (some occurances of Token got missed) r= gerv, a= justdave --- diff --git a/Bugzilla/Auth.pm b/Bugzilla/Auth.pm index 21d4409604..22c2fc5616 100644 --- a/Bugzilla/Auth.pm +++ b/Bugzilla/Auth.pm @@ -175,7 +175,7 @@ argument is a string, not a tag. This determines if the user's account details can be modified. If this method returns a C value, then accounts can be created and modified through the Bugzilla user interface. Forgotten passwords can also be -retrieved through the L. +retrieved through the L. =back diff --git a/Bugzilla/Auth/DB.pm b/Bugzilla/Auth/DB.pm index 34ec9983c6..dee3b5db9b 100644 --- a/Bugzilla/Auth/DB.pm +++ b/Bugzilla/Auth/DB.pm @@ -50,8 +50,8 @@ sub authenticate { # The user's credentials are okay, so delete any outstanding # password tokens they may have generated. - require Token; - Token::DeletePasswordTokens($userid, "user_logged_in"); + require Bugzilla::Token; + Bugzilla::Token::DeletePasswordTokens($userid, "user_logged_in"); # Account may have been disabled my $disabledtext = $class->get_disabled($userid); diff --git a/Bugzilla/Token.pm b/Bugzilla/Token.pm index 20ce480501..d7d326ccca 100644 --- a/Bugzilla/Token.pm +++ b/Bugzilla/Token.pm @@ -26,7 +26,7 @@ # Make it harder for us to do dangerous things in Perl. use strict; -# Bundle the functions in this file together into the "Token" package. +# Bundle the functions in this file together into the "Bugzilla::Token" package. package Bugzilla::Token; use Bugzilla::Config; @@ -247,7 +247,7 @@ sub DeletePasswordTokens { "WHERE userid=? AND tokentype='password'"); $sth->execute($userid); while (my $token = $sth->fetchrow_array) { - Token::Cancel($token, $reason); + Bugzilla::Token::Cancel($token, $reason); } } diff --git a/token.cgi b/token.cgi index f918890092..2a0f3c5155 100755 --- a/token.cgi +++ b/token.cgi @@ -157,7 +157,7 @@ exit; ################################################################################ sub requestChangePassword { - Token::IssuePasswordToken($cgi->param('loginname')); + Bugzilla::Token::IssuePasswordToken($cgi->param('loginname')); $vars->{'message'} = "password_change_request"; @@ -236,8 +236,8 @@ sub changeEmail { # The new email address should be available as this was # confirmed initially so cancel token if it is not still available if (! ValidateNewUser($new_email,$old_email)) { - $vars->{'email'} = $new_email; # Needed for Token::Cancel's mail - Token::Cancel($::token,"account_exists"); + $vars->{'email'} = $new_email; # Needed for Bugzilla::Token::Cancel's mail + Bugzilla::Token::Cancel($::token,"account_exists"); ThrowUserError("account_exists", { email => $new_email } ); }