summaryrefslogtreecommitdiff
path: root/modules/simpletest/tests/upgrade/upgrade.user.test
diff options
context:
space:
mode:
authorwebchick <webchick@24967.no-reply.drupal.org>2011-09-30 15:15:54 -0700
committerwebchick <webchick@24967.no-reply.drupal.org>2011-09-30 15:15:54 -0700
commit0b19df68bdaba9c9d11da50d562007bf5969125f (patch)
tree38e842a80cad782aff98fdf2f07d22855b647de1 /modules/simpletest/tests/upgrade/upgrade.user.test
parentaed4de70c7bcaddb63f4b7eedec73f9802a88791 (diff)
downloadbrdo-0b19df68bdaba9c9d11da50d562007bf5969125f.tar.gz
brdo-0b19df68bdaba9c9d11da50d562007bf5969125f.tar.bz2
Issue #1205138 by pwolanin, Dave Reid: Do not blow away non-MD5 password hashes in user_update_7000().
Diffstat (limited to 'modules/simpletest/tests/upgrade/upgrade.user.test')
-rw-r--r--modules/simpletest/tests/upgrade/upgrade.user.test3
1 files changed, 3 insertions, 0 deletions
diff --git a/modules/simpletest/tests/upgrade/upgrade.user.test b/modules/simpletest/tests/upgrade/upgrade.user.test
index 6c669219a..c33ba1179 100644
--- a/modules/simpletest/tests/upgrade/upgrade.user.test
+++ b/modules/simpletest/tests/upgrade/upgrade.user.test
@@ -26,6 +26,9 @@ class UserUpgradePathPasswordTokenTestCase extends UpgradePathTestCase {
public function testUserUpgrade() {
$this->assertTrue($this->performUpgrade(), 'The upgrade was completed successfully.');
$this->assertEqual(variable_get('user_mail_register_no_approval_required_body'), ', [user:name], [site:name], [site:url], [site:url-brief], [user:mail], [date:medium], [site:login-url], [user:edit-url], [user:one-time-login-url].', 'Existing email templates have been modified (password token involved).');
+ // Check that a non-md5 hash was untouched.
+ $pass = db_query('SELECT pass FROM {users} WHERE uid = 3')->fetchField();
+ $this->assertEqual('$S$DAK00p3Dkojkf4O/UizYxenguXnjv', $pass, 'Pre-existing non-MD5 password hash was not altered');
}
}