summaryrefslogtreecommitdiffstats
path: root/Bugzilla
diff options
context:
space:
mode:
Diffstat (limited to 'Bugzilla')
-rw-r--r--Bugzilla/Auth.pm2
-rw-r--r--Bugzilla/Auth/DB.pm4
-rw-r--r--Bugzilla/Token.pm4
3 files changed, 5 insertions, 5 deletions
diff --git a/Bugzilla/Auth.pm b/Bugzilla/Auth.pm
index 21d440960..22c2fc561 100644
--- a/Bugzilla/Auth.pm
+++ b/Bugzilla/Auth.pm
@@ -175,7 +175,7 @@ argument is a string, not a tag.
This determines if the user's account details can be modified. If this
method returns a C<true> value, then accounts can be created and modified
through the Bugzilla user interface. Forgotten passwords can also be
-retrieved through the L<Token interface|Token>.
+retrieved through the L<Token interface|Bugzilla::Token>.
=back
diff --git a/Bugzilla/Auth/DB.pm b/Bugzilla/Auth/DB.pm
index 34ec9983c..dee3b5db9 100644
--- a/Bugzilla/Auth/DB.pm
+++ b/Bugzilla/Auth/DB.pm
@@ -50,8 +50,8 @@ sub authenticate {
# The user's credentials are okay, so delete any outstanding
# password tokens they may have generated.
- require Token;
- Token::DeletePasswordTokens($userid, "user_logged_in");
+ require Bugzilla::Token;
+ Bugzilla::Token::DeletePasswordTokens($userid, "user_logged_in");
# Account may have been disabled
my $disabledtext = $class->get_disabled($userid);
diff --git a/Bugzilla/Token.pm b/Bugzilla/Token.pm
index 20ce48050..d7d326ccc 100644
--- a/Bugzilla/Token.pm
+++ b/Bugzilla/Token.pm
@@ -26,7 +26,7 @@
# Make it harder for us to do dangerous things in Perl.
use strict;
-# Bundle the functions in this file together into the "Token" package.
+# Bundle the functions in this file together into the "Bugzilla::Token" package.
package Bugzilla::Token;
use Bugzilla::Config;
@@ -247,7 +247,7 @@ sub DeletePasswordTokens {
"WHERE userid=? AND tokentype='password'");
$sth->execute($userid);
while (my $token = $sth->fetchrow_array) {
- Token::Cancel($token, $reason);
+ Bugzilla::Token::Cancel($token, $reason);
}
}