Koha/members/apikeys.pl
Tomas Cohen Arazi 5cf8bbfb7a Bug 20624: Make staff client respect RESTOAuth2ClientCredentials
This patch makes the staff client UI respect the
RESTOAuth2ClientCredentials syspref.

To test:
- Make sure RESTOAuth2ClientCredentials is "Don't enable"
- Go to a patron's detail page
=> SUCCESS: The 'More' dropdown doesn't show the API keys management
link.
- Enable RESTOAuth2ClientCredentials
- Reload
=> SUCCESS: The 'More' dropdown shows the API keys management link
- Click on the API keys management link
=> SUCCESS: You can edit the api keys
- Disable the syspref
- Reload
=> SUCCESS: You are presented an error 400 page.
- Sign off :-D

Signed-off-by: Kyle M Hall <kyle@bywatersolutions.com>

Signed-off-by: Jonathan Druart <jonathan.druart@bugs.koha-community.org>
2018-05-09 12:56:02 -03:00

124 lines
3.5 KiB
Perl
Executable file

#!/usr/bin/perl
# This file is part of Koha.
#
# Copyright 2015 BibLibre
#
# Koha is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# Koha is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Koha; if not, see <http://www.gnu.org/licenses>.
use Modern::Perl;
use CGI;
use C4::Auth;
use C4::Output;
use Koha::ApiKeys;
use Koha::Patrons;
use Koha::Token;
my $cgi = new CGI;
my ( $template, $loggedinuser, $cookie ) = get_template_and_user(
{ template_name => 'members/apikeys.tt',
query => $cgi,
type => 'intranet',
authnotrequired => 0,
flagsrequired => { borrowers => 'edit_borrowers' },
}
);
my $patron;
my $patron_id = $cgi->param('patron_id') // '';
my $api_key = $cgi->param('key') // '';
$patron = Koha::Patrons->find($patron_id) if $patron_id;
if ( not defined $patron or
not C4::Context->preference('RESTOAuth2ClientCredentials') ) {
# patron_id invalid -> exit
print $cgi->redirect("/cgi-bin/koha/errors/404.pl"); # escape early
exit;
}
my $op = $cgi->param('op') // '';
if ( $op eq 'generate' or
$op eq 'delete' or
$op eq 'revoke' or
$op eq 'activate' ) {
die "Wrong CSRF token"
unless Koha::Token->new->check_csrf({
session_id => scalar $cgi->cookie('CGISESSID'),
token => scalar $cgi->param('csrf_token'),
});
}
if ($op) {
if ( $op eq 'generate' ) {
my $description = $cgi->param('description') // '';
my $api_key = Koha::ApiKey->new(
{ patron_id => $patron_id,
description => $description
}
);
$api_key->store;
print $cgi->redirect( '/cgi-bin/koha/members/apikeys.pl?patron_id=' . $patron_id );
exit;
}
if ( $op eq 'delete' ) {
my $api_key_id = $cgi->param('key');
my $key = Koha::ApiKeys->find({ patron_id => $patron_id, client_id => $api_key_id });
if ($key) {
$key->delete;
}
print $cgi->redirect( '/cgi-bin/koha/members/apikeys.pl?patron_id=' . $patron_id );
exit;
}
if ( $op eq 'revoke' ) {
my $api_key_id = $cgi->param('key');
my $key = Koha::ApiKeys->find({ patron_id => $patron_id, client_id => $api_key_id });
if ($key) {
$key->active(0);
$key->store;
}
print $cgi->redirect( '/cgi-bin/koha/members/apikeys.pl?patron_id=' . $patron_id );
exit;
}
if ( $op eq 'activate' ) {
my $api_key_id = $cgi->param('key');
my $key = Koha::ApiKeys->find({ patron_id => $patron_id, client_id => $api_key_id });
if ($key) {
$key->active(1);
$key->store;
}
print $cgi->redirect( '/cgi-bin/koha/members/apikeys.pl?patron_id=' . $patron_id );
exit;
}
}
my @api_keys = Koha::ApiKeys->search({ patron_id => $patron_id });
$template->param(
api_keys => \@api_keys,
csrf_token => Koha::Token->new->generate_csrf({ session_id => scalar $cgi->cookie('CGISESSID') }),
patron => $patron
);
output_html_with_http_headers $cgi, $cookie, $template->output;