summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid Rothstein <drothstein@gmail.com>2013-03-30 15:40:35 -0400
committerDavid Rothstein <drothstein@gmail.com>2013-03-30 15:40:35 -0400
commitbbf013472b533c85a06e06fed006abb6d5f08e6a (patch)
tree1a3ff6d6317c6ad9209d6187461e9181de673896
parente66de8b0264c5acdc689ff76b18779e0186ca4b4 (diff)
downloadbrdo-bbf013472b533c85a06e06fed006abb6d5f08e6a.tar.gz
brdo-bbf013472b533c85a06e06fed006abb6d5f08e6a.tar.bz2
Issue #1564996 by greggles: Added Make one-time login link watchdog more useful for auditing.
-rw-r--r--modules/user/user.pages.inc2
1 files changed, 1 insertions, 1 deletions
diff --git a/modules/user/user.pages.inc b/modules/user/user.pages.inc
index c4b68b9f6..29fe6cf4d 100644
--- a/modules/user/user.pages.inc
+++ b/modules/user/user.pages.inc
@@ -128,12 +128,12 @@ function user_pass_reset($form, &$form_state, $uid, $timestamp, $hashed_pass, $a
elseif ($account->uid && $timestamp >= $account->login && $timestamp <= $current && $hashed_pass == user_pass_rehash($account->pass, $timestamp, $account->login)) {
// First stage is a confirmation form, then login
if ($action == 'login') {
- watchdog('user', 'User %name used one-time login link at time %timestamp.', array('%name' => $account->name, '%timestamp' => $timestamp));
// Set the new user.
$user = $account;
// user_login_finalize() also updates the login timestamp of the
// user, which invalidates further use of the one-time login link.
user_login_finalize();
+ watchdog('user', 'User %name used one-time login link at time %timestamp.', array('%name' => $account->name, '%timestamp' => $timestamp));
drupal_set_message(t('You have just used your one-time login link. It is no longer necessary to use this link to log in. Please change your password.'));
// Let the user's password be changed without the current password check.
$token = drupal_hash_base64(drupal_random_bytes(55));