Bug 26250: Fix tests when SearchEngine=Elastic
[koha.git] / t / db_dependent / Passwordrecovery.t
1 #!/usr/bin/perl
2
3 # This file is part of Koha.
4 #
5 # Koha is free software; you can redistribute it and/or modify it
6 # under the terms of the GNU General Public License as published by
7 # the Free Software Foundation; either version 3 of the License, or
8 # (at your option) any later version.
9 #
10 # Koha is distributed in the hope that it will be useful, but
11 # WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
14 #
15 # You should have received a copy of the GNU General Public License
16 # along with Koha; if not, see <http://www.gnu.org/licenses>.
17
18 use Modern::Perl;
19
20 use C4::Context;
21 use Mail::Sendmail;
22 use C4::Letters;
23 use Koha::Database;
24 use Koha::DateUtils;
25 use Koha::Patrons;
26 use t::lib::TestBuilder;
27
28 use Test::More tests => 22;
29 use Test::MockModule;
30 use Test::Warn;
31 use Carp;
32
33 my %mail;
34 my $module = Test::MockModule->new('Mail::Sendmail');
35 $module->mock(
36     'sendmail',
37     sub {
38         carp 'Fake sendmail';
39         %mail = @_;
40     }
41 );
42
43 use_ok('Koha::Patron::Password::Recovery');
44
45 my $schema = Koha::Database->new()->schema();
46 $schema->storage->txn_begin();
47
48 #
49 # Start with fresh data
50 #
51 my $builder = t::lib::TestBuilder->new;
52 my $borrowernumber1 = '2000000000';
53 my $borrowernumber2 = '2000000001';
54 my $borrowernumber3 = '2000000002';
55 my $userid1 = "I83MFItzRpGPxD3vW0";
56 my $userid2 = "Gh5t43980hfSAOcvne";
57 my $userid3 = "adsfada80hfSAOcvne";
58 my $email1  = $userid1 . '@koha-community.org';
59 my $email2  = $userid2 . '@koha-community.org';
60 my $email3  = $userid3 . '@koha-community.org';
61 my $uuid1   = "ABCD1234";
62 my $uuid2   = "WXYZ0987";
63 my $uuid3   = "LMNO4561";
64
65 my $patron_category = $builder->build({ source => 'Category' });
66 my $branch = $builder->build({
67     source => 'Branch',
68     value => {
69         branchreturnpath => $email1,
70     },
71 });
72
73 $schema->resultset('BorrowerPasswordRecovery')->delete_all();
74
75 $schema->resultset('Borrower')->create(
76     {
77         borrowernumber  => $borrowernumber1,
78         surname         => '',
79         address         => '',
80         city            => '',
81         userid          => $userid1,
82         email           => $email1,
83         categorycode    => $patron_category->{categorycode},
84         branchcode      => $branch->{branchcode},
85     }
86 );
87 $schema->resultset('Borrower')->create(
88     {
89         borrowernumber  => $borrowernumber2,
90         surname         => '',
91         address         => '',
92         city            => '',
93         userid          => $userid2,
94         email           => $email2,
95         categorycode    => $patron_category->{categorycode},
96         branchcode      => $branch->{branchcode},
97     }
98 );
99 $schema->resultset('Borrower')->create(
100     {
101         borrowernumber => $borrowernumber3,
102         surname        => '',
103         address        => '',
104         city           => '',
105         userid         => $userid3,
106         email          => $email3,
107         categorycode   => $patron_category->{categorycode},
108         branchcode     => $branch->{branchcode},
109     }
110 );
111
112 $schema->resultset('BorrowerPasswordRecovery')->create(
113     {
114         borrowernumber => $borrowernumber1,
115         uuid           => $uuid1,
116         valid_until    => dt_from_string()->add( days => 2 )->datetime()
117     }
118 );
119 $schema->resultset('BorrowerPasswordRecovery')->create(
120     {
121         borrowernumber => $borrowernumber2,
122         uuid           => $uuid2,
123         valid_until    => dt_from_string()->subtract( days => 2 )->datetime()
124     }
125 );
126 $schema->resultset('BorrowerPasswordRecovery')->create(
127     {
128         borrowernumber => $borrowernumber3,
129         uuid           => $uuid3,
130         valid_until    => dt_from_string()->subtract( days => 3 )->datetime()
131     }
132 );
133
134
135 can_ok( "Koha::Patron::Password::Recovery", qw(ValidateBorrowernumber GetValidLinkInfo SendPasswordRecoveryEmail CompletePasswordRecovery) );
136
137 ############################################################
138 # Koha::Patron::Password::Recovery::ValidateBorrowernumber #
139 ############################################################
140
141 ok(   Koha::Patron::Password::Recovery::ValidateBorrowernumber($borrowernumber1), "[ValidateBorrowernumber] Borrower has a password recovery entry" );
142 ok( ! Koha::Patron::Password::Recovery::ValidateBorrowernumber($borrowernumber2), "[ValidateBorrowernumber] Borrower's number is not found; password recovery entry is expired" );
143 ok( ! Koha::Patron::Password::Recovery::ValidateBorrowernumber(9999), "[ValidateBorrowernumber] Borrower has no password recovery entry" );
144
145 ######################################################
146 # Koha::Patron::Password::Recovery::GetValidLinkInfo #
147 ######################################################
148
149 my ($bnum1, $uname1) = Koha::Patron::Password::Recovery::GetValidLinkInfo($uuid1);
150 my ($bnum2, $uname2) = Koha::Patron::Password::Recovery::GetValidLinkInfo($uuid2);
151 my ($bnum3, $uname3) = Koha::Patron::Password::Recovery::GetValidLinkInfo("THISISANINVALIDUUID");
152
153 is( $bnum1, $borrowernumber1, "[GetValidLinkInfo] Borrower has a valid link" );
154 is( $uname1, $userid1, "[GetValidLinkInfo] Borrower's username is fetched when a valid link is found" );
155 ok( ! defined($bnum2), "[GetValidLinkInfo] Borrower's link is no longer valid; entry is expired" );
156 ok( ! defined($bnum3), "[GetValidLinkInfo] Invalid UUID returns no borrowernumber" );
157
158 ##############################################################
159 # Koha::Patron::Password::Recovery::CompletePasswordRecovery #
160 ##############################################################
161
162 is( Koha::Patron::Password::Recovery::CompletePasswordRecovery($uuid1), 3, "[CompletePasswordRecovery] Completing a password recovery deletes the used entry" );
163
164 $schema->resultset('BorrowerPasswordRecovery')->create(
165     {
166         borrowernumber => $borrowernumber2,
167         uuid           => $uuid2,
168         valid_until    => dt_from_string()->subtract( days => 2 )->datetime()
169     }
170 );
171
172 ok( Koha::Patron::Password::Recovery::CompletePasswordRecovery($uuid2) == 1, "[CompletePasswordRecovery] An expired or invalid UUID purges expired entries" );
173 ok( Koha::Patron::Password::Recovery::CompletePasswordRecovery($uuid2) == 0, "[CompletePasswordRecovery] Returns 0 on a clean table" );
174
175 ###################################################################
176 # Koha::Patron::Password::Recovery::DeleteExpiredPasswordRecovery #
177 ###################################################################
178
179 $schema->resultset('BorrowerPasswordRecovery')->create(
180     {
181         borrowernumber => $borrowernumber3,
182         uuid           => $uuid3,
183         valid_until    => dt_from_string()->subtract( days => 3 )->datetime()
184     }
185 );
186
187 ok( Koha::Patron::Password::Recovery::DeleteExpiredPasswordRecovery($borrowernumber3) == 1, "[DeleteExpiredPasswordRecovery] we can delete the unused entry" );
188 ok( Koha::Patron::Password::Recovery::DeleteExpiredPasswordRecovery($borrowernumber3) == 0, "[DeleteExpiredPasswordRecovery] Returns 0 on a clean table" );
189
190 ###############################################################
191 # Koha::Patron::Password::Recovery::SendPasswordRecoveryEmail #
192 ###############################################################
193
194 my $borrower = Koha::Patrons->search( { userid => $userid1 } )->next;
195 my $success;
196 warning_is {
197     $success = Koha::Patron::Password::Recovery::SendPasswordRecoveryEmail($borrower, $email1, 0); }
198     "Fake sendmail",
199     '[SendPasswordRecoveryEmail] expecting fake sendmail';
200 ok( $success == 1, '[SendPasswordRecoveryEmail] Returns 1 on success');
201
202 my $letters = C4::Letters::GetQueuedMessages( { borrowernumber => $borrowernumber1, limit => 99 } );
203 ok( scalar @$letters == 1, "[SendPasswordRecoveryEmail] There is a letter in the queue for our borrower");
204
205 my $bpr = $schema->resultset('BorrowerPasswordRecovery')->search( { borrowernumber => $borrowernumber1 } );
206 my $tempuuid1 = $bpr->next->uuid;
207
208 warning_is {
209     Koha::Patron::Password::Recovery::SendPasswordRecoveryEmail($borrower, $email1, 1); }
210     "Fake sendmail",
211     '[SendPasswordRecoveryEmail] expecting fake sendmail';
212
213 $bpr = $schema->resultset('BorrowerPasswordRecovery')->search( { borrowernumber => $borrowernumber1 } );
214 my $tempuuid2 = $bpr->next->uuid;
215
216 $letters = C4::Letters::GetQueuedMessages( { borrowernumber => $borrowernumber1, limit => 99 } );
217
218 ok( $tempuuid1 ne $tempuuid2, "[SendPasswordRecoveryEmail] UPDATE == ON changes uuid in the database and updates the expirydate");
219 ok( scalar @$letters == 2, "[SendPasswordRecoveryEmail] UPDATE == ON sends a new letter with updated uuid");
220
221 foreach my $letter (@$letters) {
222     ok( $letter->{status} eq 'sent',
223         'Test SendPasswordRecoverEmail sent due to TestBuilder Sender being a valid email address as expected.' );
224 }
225
226 $schema->storage->txn_rollback();
227