diff options
author | bugreport%peshkin.net <> | 2004-07-21 05:41:18 +0000 |
---|---|---|
committer | bugreport%peshkin.net <> | 2004-07-21 05:41:18 +0000 |
commit | 7bdd1cbe564883cd12abee3657e671e97e85a8e5 (patch) | |
tree | 06dd7387c408735c32fa425489ace9a50115dd5d /token.cgi | |
parent | 899f61d64550dfd9452972cea600505cc8c7d4e3 (diff) | |
download | bugs-7bdd1cbe564883cd12abee3657e671e97e85a8e5.tar bugs-7bdd1cbe564883cd12abee3657e671e97e85a8e5.tar.gz bugs-7bdd1cbe564883cd12abee3657e671e97e85a8e5.tar.bz2 bugs-7bdd1cbe564883cd12abee3657e671e97e85a8e5.tar.xz bugs-7bdd1cbe564883cd12abee3657e671e97e85a8e5.zip |
Bug 241900: Allow Bugzilla::Auth to have multiple login and validation styles
patch by erik
r=joel, kiko
a=myk
Diffstat (limited to 'token.cgi')
-rwxr-xr-x | token.cgi | 9 |
1 files changed, 8 insertions, 1 deletions
@@ -95,12 +95,19 @@ if ($cgi->param('t')) { } } + # If the user is requesting a password change, make sure they submitted -# their login name and it exists in the database. +# their login name and it exists in the database, and that the DB module is in +# the list of allowed verification methids. if ( $::action eq 'reqpw' ) { defined $cgi->param('loginname') || ThrowUserError("login_needed_for_password_change"); + # check verification methods + unless (Bugzilla::Auth->has_db) { + ThrowUserError("password_change_requests_not_allowed"); + } + # Make sure the login name looks like an email address. This function # displays its own error and stops execution if the login name looks wrong. CheckEmailSyntax($cgi->param('loginname')); |