Tomas Cohen Arazi
15ca95ca1d
As voted when the RFC was discussed, the attribute gets renamed. The tests are adjusted accordingly. To test: - Run: $ kshell k$ prove t/db_dependent/api/v1/patrons_password.t => SUCCESS: Tests pass! Signed-off-by: Tomas Cohen Arazi <tomascohen@theke.io> Signed-off-by: Kyle M Hall <kyle@bywatersolutions.com> Signed-off-by: Nick Clemens <nick@bywatersolutions.com>
258 lines
8.6 KiB
Perl
258 lines
8.6 KiB
Perl
#!/usr/bin/perl
|
|
|
|
# This file is part of Koha.
|
|
#
|
|
# Koha is free software; you can redistribute it and/or modify it under the
|
|
# terms of the GNU General Public License as published by the Free Software
|
|
# Foundation; either version 3 of the License, or (at your option) any later
|
|
# version.
|
|
#
|
|
# Koha is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
# A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License along
|
|
# with Koha; if not, write to the Free Software Foundation, Inc.,
|
|
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
use Modern::Perl;
|
|
|
|
use Test::More tests => 2;
|
|
|
|
use Test::Mojo;
|
|
use Test::Warn;
|
|
|
|
use t::lib::TestBuilder;
|
|
use t::lib::Mocks;
|
|
|
|
use Koha::Patrons;
|
|
|
|
my $schema = Koha::Database->new->schema;
|
|
my $builder = t::lib::TestBuilder->new;
|
|
|
|
# FIXME: sessionStorage defaults to mysql, but it seems to break transaction handling
|
|
# this affects the other REST api tests
|
|
t::lib::Mocks::mock_preference( 'SessionStorage', 'tmp' );
|
|
|
|
my $remote_address = '127.0.0.1';
|
|
my $t = Test::Mojo->new('Koha::REST::V1');
|
|
|
|
subtest 'set() (authorized user tests)' => sub {
|
|
|
|
plan tests => 21;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my ( $patron, $session ) = create_user_and_session({ authorized => 1 });
|
|
|
|
t::lib::Mocks::mock_preference( 'minPasswordLength', 3 );
|
|
t::lib::Mocks::mock_preference( 'RequireStrongPassword', 0 );
|
|
|
|
my $new_password = 'abc';
|
|
|
|
my $tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(200)->json_is( '' );
|
|
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => 'cde' } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(400)->json_is({ error => 'Passwords don\'t match' });
|
|
|
|
t::lib::Mocks::mock_preference( 'minPasswordLength', 5 );
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(400)->json_is({ error => 'Password length (3) is shorter than required (5)' });
|
|
|
|
$new_password = 'abc ';
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(400)->json_is({ error => '[Password contains leading/trailing whitespace character(s)]' });
|
|
|
|
$new_password = 'abcdefg';
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(200)->json_is('');
|
|
|
|
t::lib::Mocks::mock_preference( 'RequireStrongPassword', 1);
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(400)->json_is({ error => '[Password is too weak]' });
|
|
|
|
$new_password = 'ABcde123%&';
|
|
$tx
|
|
= $t->ua->build_tx( POST => "/api/v1/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => { password => $new_password, password_2 => $new_password } );
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)->status_is(200)->json_is('');
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
subtest 'set_public() (unprivileged user tests)' => sub {
|
|
|
|
plan tests => 15;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my ( $patron, $session ) = create_user_and_session({ authorized => 0 });
|
|
my $other_patron = $builder->build_object({ class => 'Koha::Patrons' });
|
|
|
|
# Enable the public API
|
|
t::lib::Mocks::mock_preference( 'RESTPublicAPI', 1 );
|
|
|
|
t::lib::Mocks::mock_preference( 'OpacPasswordChange', 0 );
|
|
t::lib::Mocks::mock_preference( 'minPasswordLength', 3 );
|
|
t::lib::Mocks::mock_preference( 'RequireStrongPassword', 0 );
|
|
|
|
my $new_password = 'abc';
|
|
|
|
my $tx = $t->ua->build_tx(
|
|
POST => "/api/v1/public/patrons/"
|
|
. $other_patron->id
|
|
. "/password" => json => {
|
|
password => $new_password,
|
|
password_repeated => $new_password,
|
|
old_password => 'blah'
|
|
}
|
|
);
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)
|
|
->status_is(403)
|
|
->json_is({
|
|
error => 'Configuration prevents password changes by unprivileged users'
|
|
});
|
|
|
|
t::lib::Mocks::mock_preference( 'OpacPasswordChange', 1 );
|
|
|
|
my $password = 'holapassword';
|
|
$patron->set_password( $password );
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/public/patrons/"
|
|
. $other_patron->id
|
|
. "/password" => json => {
|
|
password => $new_password,
|
|
password_repeated => $new_password,
|
|
old_password => $password
|
|
}
|
|
);
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)
|
|
->status_is(403)
|
|
->json_is({
|
|
error => "Changing other patron's password is forbidden"
|
|
});
|
|
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/public/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => {
|
|
password => $new_password,
|
|
password_repeated => 'wrong_password',
|
|
old_password => $password
|
|
}
|
|
);
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_is({
|
|
error => "Passwords don't match"
|
|
});
|
|
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/public/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => {
|
|
password => $new_password,
|
|
password_repeated => $new_password,
|
|
old_password => 'badpassword'
|
|
}
|
|
);
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_is({
|
|
error => "Invalid password"
|
|
});
|
|
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/public/patrons/"
|
|
. $patron->id
|
|
. "/password" => json => {
|
|
password => $new_password,
|
|
password_repeated => $new_password,
|
|
old_password => $password
|
|
}
|
|
);
|
|
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
|
|
$tx->req->env( { REMOTE_ADDR => '127.0.0.1' } );
|
|
$t->request_ok($tx)
|
|
->status_is(200)
|
|
->json_is('');
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
sub create_user_and_session {
|
|
|
|
my ( $args ) = @_;
|
|
my $flags = ( $args->{authorized} ) ? 16 : 0;
|
|
|
|
my $user = $builder->build_object(
|
|
{
|
|
class => 'Koha::Patrons',
|
|
value => { flags => $flags }
|
|
}
|
|
);
|
|
|
|
# Create a session for the authorized user
|
|
my $session = C4::Auth::get_session('');
|
|
$session->param( 'number', $user->borrowernumber );
|
|
$session->param( 'id', $user->userid );
|
|
$session->param( 'ip', '127.0.0.1' );
|
|
$session->param( 'lasttime', time() );
|
|
$session->flush;
|
|
|
|
return ( $user, $session );
|
|
}
|