diff options
author | lpsolit%gmail.com <> | 2005-08-16 00:43:35 +0000 |
---|---|---|
committer | lpsolit%gmail.com <> | 2005-08-16 00:43:35 +0000 |
commit | 746013729e6377357efb68de8d7f2fd93e25a07c (patch) | |
tree | 1aabd9f01c7cf495ee677b23b5452abbeed96228 /token.cgi | |
parent | 09756eda41e62f1b216c38338c6d0702dccc7502 (diff) | |
download | bugs-746013729e6377357efb68de8d7f2fd93e25a07c.tar bugs-746013729e6377357efb68de8d7f2fd93e25a07c.tar.gz bugs-746013729e6377357efb68de8d7f2fd93e25a07c.tar.bz2 bugs-746013729e6377357efb68de8d7f2fd93e25a07c.tar.xz bugs-746013729e6377357efb68de8d7f2fd93e25a07c.zip |
Bug 304653: remove 'use Bugzilla::Error' from Util.pm - Patch by Frédéric Buclin <LpSolit@gmail.com> r=mkanat a=myk
Diffstat (limited to 'token.cgi')
-rwxr-xr-x | token.cgi | 7 |
1 files changed, 4 insertions, 3 deletions
@@ -110,9 +110,10 @@ if ( $::action eq 'reqpw' ) { ThrowUserError("password_change_requests_not_allowed"); } - # Make sure the login name looks like an email address. This function - # displays its own error and stops execution if the login name looks wrong. - check_email_syntax($cgi->param('loginname')); + # Make sure the login name looks like an email address. + validate_email_syntax($cgi->param('loginname')) + || ThrowUserError('illegal_email_address', + {addr => $cgi->param('loginname')}); my $quotedloginname = SqlQuote($cgi->param('loginname')); SendSQL("SELECT userid FROM profiles WHERE " . |