aboutsummaryrefslogtreecommitdiff
path: root/actions/user/password.php
diff options
context:
space:
mode:
authorcash <cash@36083f99-b078-4883-b0ff-0f9b5a30f544>2011-02-13 19:44:26 +0000
committercash <cash@36083f99-b078-4883-b0ff-0f9b5a30f544>2011-02-13 19:44:26 +0000
commitf9501bd6cef73e88b130c6640087008f8d58ef92 (patch)
treefbf2602a69e85738d11f5f72a47fbe70904fd227 /actions/user/password.php
parent11cc3f9f5b2551322e6c51a453291e7ecf5d364d (diff)
downloadelgg-f9501bd6cef73e88b130c6640087008f8d58ef92.tar.gz
elgg-f9501bd6cef73e88b130c6640087008f8d58ef92.tar.bz2
Fixes #2848 pulls user settings code out of actions into functions. We should investigate putting them in a library that is only loaded on demand
git-svn-id: http://code.elgg.org/elgg/trunk@8204 36083f99-b078-4883-b0ff-0f9b5a30f544
Diffstat (limited to 'actions/user/password.php')
-rw-r--r--actions/user/password.php49
1 files changed, 0 insertions, 49 deletions
diff --git a/actions/user/password.php b/actions/user/password.php
deleted file mode 100644
index 8619372e4..000000000
--- a/actions/user/password.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-/**
- * Action for changing a user's password
- *
- * @package Elgg
- * @subpackage Core
- */
-
-$current_password = get_input('current_password');
-$password = get_input('password');
-$password2 = get_input('password2');
-$user_id = get_input('guid');
-
-if (!$user_id) {
- $user = elgg_get_logged_in_user_entity();
-} else {
- $user = get_entity($user_id);
-}
-
-if (($user) && ($password != "")) {
- // let admin user change anyone's password without knowing it except his own.
- if (!elgg_is_admin_logged_in() || elgg_is_admin_logged_in() && $user->guid == elgg_get_logged_in_user_guid()) {
- $credentials = array(
- 'username' => $user->username,
- 'password' => $current_password
- );
-
- if (!pam_auth_userpass($credentials)) {
- register_error(elgg_echo('user:password:fail:incorrect_current_password'));
- forward(REFERER);
- }
- }
-
- if (strlen($password) >= 4) {
- if ($password == $password2) {
- $user->salt = generate_random_cleartext_password(); // Reset the salt
- $user->password = generate_user_password($user, $password);
- if ($user->save()) {
- system_message(elgg_echo('user:password:success'));
- } else {
- register_error(elgg_echo('user:password:fail'));
- }
- } else {
- register_error(elgg_echo('user:password:fail:notsame'));
- }
- } else {
- register_error(elgg_echo('user:password:fail:tooshort'));
- }
-}