Tomas Cohen Arazi
562eaa154b
With the introduction of the /public namespace all other endpoints, the rest of the endpoints are restricted to privileged users. This patch makes the GET /libraries and GET /libraries/:library_id endpoints require 'catalogue' permissions. Signed-off-by: Tomas Cohen Arazi <tomascohen@theke.io> Signed-off-by: Martin Renvoize <martin.renvoize@ptfs-europe.com> Signed-off-by: Nick Clemens <nick@bywatersolutions.com>
382 lines
14 KiB
Perl
382 lines
14 KiB
Perl
#!/usr/bin/env perl
|
|
|
|
# This file is part of Koha.
|
|
#
|
|
# Koha is free software; you can redistribute it and/or modify it under the
|
|
# terms of the GNU General Public License as published by the Free Software
|
|
# Foundation; either version 3 of the License, or (at your option) any later
|
|
# version.
|
|
#
|
|
# Koha is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
# A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License along
|
|
# with Koha; if not, write to the Free Software Foundation, Inc.,
|
|
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
use Modern::Perl;
|
|
|
|
use Test::More tests => 5;
|
|
use Test::Mojo;
|
|
use Test::Warn;
|
|
|
|
use t::lib::TestBuilder;
|
|
use t::lib::Mocks;
|
|
|
|
use C4::Auth;
|
|
use Koha::Libraries;
|
|
use Koha::Database;
|
|
|
|
my $schema = Koha::Database->new->schema;
|
|
my $builder = t::lib::TestBuilder->new;
|
|
|
|
# FIXME: sessionStorage defaults to mysql, but it seems to break transaction handling
|
|
# this affects the other REST api tests
|
|
t::lib::Mocks::mock_preference( 'SessionStorage', 'tmp' );
|
|
|
|
my $remote_address = '127.0.0.1';
|
|
my $t = Test::Mojo->new('Koha::REST::V1');
|
|
|
|
subtest 'list() tests' => sub {
|
|
plan tests => 8;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
# Create test context
|
|
my $library = $builder->build_object({ class => 'Koha::Libraries' });
|
|
my $another_library = $library->unblessed; # create a copy of $library but make
|
|
delete $another_library->{branchcode}; # sure branchcode will be regenerated
|
|
$another_library = $builder->build_object({ class => 'Koha::Libraries', value => $another_library });
|
|
my ( $borrowernumber, $session_id ) = create_user_and_session( { authorized => 1 } );
|
|
|
|
## Authorized user tests
|
|
my $count_of_libraries = Koha::Libraries->search->count;
|
|
# Make sure we are returned with the correct amount of libraries
|
|
my $tx = $t->ua->build_tx( GET => '/api/v1/libraries' );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is( 200, 'SWAGGER3.2.2' )
|
|
->json_has('/'.($count_of_libraries-1).'/library_id')
|
|
->json_hasnt('/'.($count_of_libraries).'/library_id');
|
|
|
|
subtest 'query parameters' => sub {
|
|
|
|
my $fields = {
|
|
name => 'branchname',
|
|
address1 => 'branchaddress1',
|
|
address2 => 'branchaddress2',
|
|
address3 => 'branchaddress3',
|
|
postal_code => 'branchzip',
|
|
city => 'branchcity',
|
|
state => 'branchstate',
|
|
country => 'branchcountry',
|
|
phone => 'branchphone',
|
|
fax => 'branchfax',
|
|
email => 'branchemail',
|
|
reply_to_email => 'branchreplyto',
|
|
return_path_email => 'branchreturnpath',
|
|
url => 'branchurl',
|
|
ip => 'branchip',
|
|
notes => 'branchnotes',
|
|
opac_info => 'opac_info',
|
|
};
|
|
|
|
my $size = keys %{$fields};
|
|
|
|
plan tests => $size * 3;
|
|
|
|
foreach my $field ( keys %{$fields} ) {
|
|
my $model_field = $fields->{ $field };
|
|
$tx = $t->ua->build_tx( GET =>
|
|
"/api/v1/libraries?$field=" . $library->$model_field );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
my $result =
|
|
$t->request_ok($tx)
|
|
->status_is(200)
|
|
->json_has( [ $library, $another_library ] );
|
|
}
|
|
};
|
|
|
|
# Warn on unsupported query parameter
|
|
$tx = $t->ua->build_tx( GET => '/api/v1/libraries?library_blah=blah' );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_is( [{ path => '/query/library_blah', message => 'Malformed query string'}] );
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
subtest 'get() tests' => sub {
|
|
|
|
plan tests => 6;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my $library = $builder->build_object( { class => 'Koha::Libraries' } );
|
|
my ( $borrowernumber, $session_id ) =
|
|
create_user_and_session( { authorized => 1 } );
|
|
|
|
my $tx = $t->ua->build_tx( GET => "/api/v1/libraries/" . $library->branchcode );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is( 200, 'SWAGGER3.2.2' )
|
|
->json_is( '' => Koha::REST::V1::Library::_to_api( $library->TO_JSON ), 'SWAGGER3.3.2' );
|
|
|
|
my $non_existent_code = $library->branchcode;
|
|
$library->delete;
|
|
|
|
$tx = $t->ua->build_tx( GET => "/api/v1/libraries/" . $non_existent_code );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(404)
|
|
->json_is( '/error' => 'Library not found' );
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
subtest 'add() tests' => sub {
|
|
|
|
plan tests => 17;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my ( $unauthorized_borrowernumber, $unauthorized_session_id ) =
|
|
create_user_and_session( { authorized => 0 } );
|
|
my ( $authorized_borrowernumber, $authorized_session_id ) =
|
|
create_user_and_session( { authorized => 1 } );
|
|
|
|
my $library_obj = $builder->build_object({ class => 'Koha::Libraries' });
|
|
my $library = Koha::REST::V1::Library::_to_api( $library_obj->TO_JSON );
|
|
$library_obj->delete;
|
|
|
|
# Unauthorized attempt to write
|
|
my $tx = $t->ua->build_tx( POST => "/api/v1/libraries" => json => $library );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $unauthorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(403);
|
|
|
|
# Authorized attempt to write invalid data
|
|
my $library_with_invalid_field = { %$library };
|
|
$library_with_invalid_field->{'branchinvalid'} = 'Library invalid';
|
|
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/libraries" => json => $library_with_invalid_field );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_is(
|
|
"/errors" => [
|
|
{
|
|
message => "Properties not allowed: branchinvalid.",
|
|
path => "/body"
|
|
}
|
|
]
|
|
);
|
|
|
|
# Authorized attempt to write
|
|
$tx = $t->ua->build_tx( POST => "/api/v1/libraries" => json => $library );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is( 201, 'SWAGGER3.2.1' )
|
|
->json_is( '' => $library, 'SWAGGER3.3.1' )
|
|
->header_is( Location => '/api/v1/libraries/' . $library->{library_id}, 'SWAGGER3.4.1' );
|
|
|
|
# save the library_id
|
|
my $library_id = $library->{library_id};
|
|
# Authorized attempt to create with null id
|
|
$library->{library_id} = undef;
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/libraries" => json => $library );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_has('/errors');
|
|
|
|
# Authorized attempt to create with existing id
|
|
$library->{library_id} = $library_id;
|
|
$tx = $t->ua->build_tx(
|
|
POST => "/api/v1/libraries" => json => $library );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
|
|
warning_like {
|
|
$t->request_ok($tx)
|
|
->status_is(409)
|
|
->json_has( '/error' => "Fails when trying to add an existing library_id")
|
|
->json_is( '/conflict', 'PRIMARY' ); } # WTF
|
|
qr/^DBD::mysql::st execute failed: Duplicate entry '(.*)' for key 'PRIMARY'/;
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
subtest 'update() tests' => sub {
|
|
plan tests => 13;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my ( $unauthorized_borrowernumber, $unauthorized_session_id ) =
|
|
create_user_and_session( { authorized => 0 } );
|
|
my ( $authorized_borrowernumber, $authorized_session_id ) =
|
|
create_user_and_session( { authorized => 1 } );
|
|
|
|
my $library = $builder->build_object({ class => 'Koha::Libraries' });
|
|
my $library_id = $library->branchcode;
|
|
|
|
# Unauthorized attempt to update
|
|
my $tx = $t->ua->build_tx( PUT => "/api/v1/libraries/$library_id"
|
|
=> json => { branchname => 'New unauthorized name change' } );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $unauthorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(403);
|
|
|
|
# Attempt partial update on a PUT
|
|
my $library_with_missing_field = {
|
|
address1 => "New library address",
|
|
};
|
|
|
|
$tx = $t->ua->build_tx( PUT => "/api/v1/libraries/$library_id" =>
|
|
json => $library_with_missing_field );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_has( "/errors" =>
|
|
[ { message => "Missing property.", path => "/body/address2" } ]
|
|
);
|
|
|
|
my $deleted_library = $builder->build_object( { class => 'Koha::Libraries' } );
|
|
my $library_with_updated_field = Koha::REST::V1::Library::_to_api( $deleted_library->TO_JSON );
|
|
$library_with_updated_field->{library_id} = $library_id;
|
|
$deleted_library->delete;
|
|
|
|
$tx = $t->ua->build_tx( PUT => "/api/v1/libraries/$library_id" => json => $library_with_updated_field );
|
|
$tx->req->cookies( { name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(200, 'SWAGGER3.2.1')
|
|
->json_is( '' => $library_with_updated_field, 'SWAGGER3.3.3' );
|
|
|
|
# Authorized attempt to write invalid data
|
|
my $library_with_invalid_field = { %$library_with_updated_field };
|
|
$library_with_invalid_field->{'branchinvalid'} = 'Library invalid';
|
|
|
|
$tx = $t->ua->build_tx(
|
|
PUT => "/api/v1/libraries/$library_id" => json => $library_with_invalid_field );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(400)
|
|
->json_is(
|
|
"/errors" => [
|
|
{
|
|
message => "Properties not allowed: branchinvalid.",
|
|
path => "/body"
|
|
}
|
|
]
|
|
);
|
|
|
|
my $non_existent_code = 'nope'.int(rand(10000));
|
|
$tx =
|
|
$t->ua->build_tx( PUT => "/api/v1/libraries/$non_existent_code" => json =>
|
|
$library_with_updated_field );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(404);
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
subtest 'delete() tests' => sub {
|
|
plan tests => 7;
|
|
|
|
$schema->storage->txn_begin;
|
|
|
|
my ( $unauthorized_borrowernumber, $unauthorized_session_id ) =
|
|
create_user_and_session( { authorized => 0 } );
|
|
my ( $authorized_borrowernumber, $authorized_session_id ) =
|
|
create_user_and_session( { authorized => 1 } );
|
|
|
|
my $branchcode = $builder->build( { source => 'Branch' } )->{branchcode};
|
|
|
|
# Unauthorized attempt to delete
|
|
my $tx = $t->ua->build_tx( DELETE => "/api/v1/libraries/$branchcode" );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $unauthorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(403);
|
|
|
|
$tx = $t->ua->build_tx( DELETE => "/api/v1/libraries/$branchcode" );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(204, 'SWAGGER3.2.4')
|
|
->content_is('', 'SWAGGER3.3.4');
|
|
|
|
$tx = $t->ua->build_tx( DELETE => "/api/v1/libraries/$branchcode" );
|
|
$tx->req->cookies(
|
|
{ name => 'CGISESSID', value => $authorized_session_id } );
|
|
$tx->req->env( { REMOTE_ADDR => $remote_address } );
|
|
$t->request_ok($tx)
|
|
->status_is(404);
|
|
|
|
$schema->storage->txn_rollback;
|
|
};
|
|
|
|
sub create_user_and_session {
|
|
|
|
my $args = shift;
|
|
my $flags = ( $args->{authorized} ) ? $args->{authorized} : 0;
|
|
my $dbh = C4::Context->dbh;
|
|
|
|
my $user = $builder->build(
|
|
{
|
|
source => 'Borrower',
|
|
value => {
|
|
flags => $flags
|
|
}
|
|
}
|
|
);
|
|
|
|
# Create a session for the authorized user
|
|
my $session = C4::Auth::get_session('');
|
|
$session->param( 'number', $user->{borrowernumber} );
|
|
$session->param( 'id', $user->{userid} );
|
|
$session->param( 'ip', '127.0.0.1' );
|
|
$session->param( 'lasttime', time() );
|
|
$session->flush;
|
|
|
|
if ( $args->{authorized} ) {
|
|
$dbh->do( "
|
|
INSERT INTO user_permissions (borrowernumber,module_bit,code)
|
|
VALUES (?,3,'parameters_remaining_permissions')", undef,
|
|
$user->{borrowernumber} );
|
|
}
|
|
|
|
return ( $user->{borrowernumber}, $session->id );
|
|
}
|
|
|
|
1;
|