diff options
author | David Rothstein <drothstein@gmail.com> | 2013-03-30 15:40:35 -0400 |
---|---|---|
committer | David Rothstein <drothstein@gmail.com> | 2013-03-30 15:40:35 -0400 |
commit | bbf013472b533c85a06e06fed006abb6d5f08e6a (patch) | |
tree | 1a3ff6d6317c6ad9209d6187461e9181de673896 /modules | |
parent | e66de8b0264c5acdc689ff76b18779e0186ca4b4 (diff) | |
download | brdo-bbf013472b533c85a06e06fed006abb6d5f08e6a.tar.gz brdo-bbf013472b533c85a06e06fed006abb6d5f08e6a.tar.bz2 |
Issue #1564996 by greggles: Added Make one-time login link watchdog more useful for auditing.
Diffstat (limited to 'modules')
-rw-r--r-- | modules/user/user.pages.inc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/modules/user/user.pages.inc b/modules/user/user.pages.inc index c4b68b9f6..29fe6cf4d 100644 --- a/modules/user/user.pages.inc +++ b/modules/user/user.pages.inc @@ -128,12 +128,12 @@ function user_pass_reset($form, &$form_state, $uid, $timestamp, $hashed_pass, $a elseif ($account->uid && $timestamp >= $account->login && $timestamp <= $current && $hashed_pass == user_pass_rehash($account->pass, $timestamp, $account->login)) { // First stage is a confirmation form, then login if ($action == 'login') { - watchdog('user', 'User %name used one-time login link at time %timestamp.', array('%name' => $account->name, '%timestamp' => $timestamp)); // Set the new user. $user = $account; // user_login_finalize() also updates the login timestamp of the // user, which invalidates further use of the one-time login link. user_login_finalize(); + watchdog('user', 'User %name used one-time login link at time %timestamp.', array('%name' => $account->name, '%timestamp' => $timestamp)); drupal_set_message(t('You have just used your one-time login link. It is no longer necessary to use this link to log in. Please change your password.')); // Let the user's password be changed without the current password check. $token = drupal_hash_base64(drupal_random_bytes(55)); |