From 0b19df68bdaba9c9d11da50d562007bf5969125f Mon Sep 17 00:00:00 2001 From: webchick Date: Fri, 30 Sep 2011 15:15:54 -0700 Subject: Issue #1205138 by pwolanin, Dave Reid: Do not blow away non-MD5 password hashes in user_update_7000(). --- modules/simpletest/tests/upgrade/upgrade.user.test | 3 +++ 1 file changed, 3 insertions(+) (limited to 'modules/simpletest/tests/upgrade/upgrade.user.test') diff --git a/modules/simpletest/tests/upgrade/upgrade.user.test b/modules/simpletest/tests/upgrade/upgrade.user.test index 6c669219a..c33ba1179 100644 --- a/modules/simpletest/tests/upgrade/upgrade.user.test +++ b/modules/simpletest/tests/upgrade/upgrade.user.test @@ -26,6 +26,9 @@ class UserUpgradePathPasswordTokenTestCase extends UpgradePathTestCase { public function testUserUpgrade() { $this->assertTrue($this->performUpgrade(), 'The upgrade was completed successfully.'); $this->assertEqual(variable_get('user_mail_register_no_approval_required_body'), ', [user:name], [site:name], [site:url], [site:url-brief], [user:mail], [date:medium], [site:login-url], [user:edit-url], [user:one-time-login-url].', 'Existing email templates have been modified (password token involved).'); + // Check that a non-md5 hash was untouched. + $pass = db_query('SELECT pass FROM {users} WHERE uid = 3')->fetchField(); + $this->assertEqual('$S$DAK00p3Dkojkf4O/UizYxenguXnjv', $pass, 'Pre-existing non-MD5 password hash was not altered'); } } -- cgit v1.2.3