Bug 19382: (follow-up) Alternate tests
[koha.git] / opac / opac-password-recovery.pl
blob3d492dd2055bde792875b7000b7164ee4b476f00
1 #!/usr/bin/perl
3 use Modern::Perl;
4 use CGI;
6 use C4::Auth;
7 use C4::Koha;
8 use C4::Output;
9 use C4::Context;
10 use Koha::Patron::Password::Recovery
11 qw(SendPasswordRecoveryEmail ValidateBorrowernumber GetValidLinkInfo CompletePasswordRecovery DeleteExpiredPasswordRecovery);
12 use Koha::Patrons;
13 use Koha::Patrons;
14 my $query = new CGI;
15 use HTML::Entities;
16 use Try::Tiny;
17 use List::Util qw/any/;
19 my ( $template, $dummy, $cookie ) = get_template_and_user(
21 template_name => "opac-password-recovery.tt",
22 query => $query,
23 type => "opac",
24 authnotrequired => 1,
25 debug => 1,
29 my $email = $query->param('email') // q{};
30 my $password = $query->param('newPassword');
31 my $repeatPassword = $query->param('repeatPassword');
32 my $id = $query->param('id');
33 my $uniqueKey = $query->param('uniqueKey');
34 my $username = $query->param('username') // q{};
35 my $borrower_number;
37 #errors
38 my $hasError;
40 #email form error
41 my $errNoBorrowerFound;
42 my $errNoBorrowerEmail;
43 my $errMultipleAccountsForEmail;
44 my $errAlreadyStartRecovery;
45 my $errTooManyEmailFound;
46 my $errBadEmail;
47 my $errResetForbidden;
49 #new password form error
50 my $errLinkNotValid;
52 if ( $query->param('sendEmail') || $query->param('resendEmail') ) {
54 #try with the main email
55 my $borrower;
56 my $search_results;
57 # Find the borrower by userid, card number, or email
58 if ($username) {
59 $search_results = Koha::Patrons->search( { -or => { userid => $username, cardnumber => $username }, login_attempts => { '!=', Koha::Patron::ADMINISTRATIVE_LOCKOUT } } );
61 elsif ($email) {
62 $search_results = Koha::Patrons->search( { -or => { email => $email, emailpro => $email, B_email => $email }, login_attempts => { '!=', Koha::Patron::ADMINISTRATIVE_LOCKOUT } } );
65 if ( !defined $search_results || $search_results->count < 1) {
66 $hasError = 1;
67 $errNoBorrowerFound = 1;
69 elsif ( $username && $search_results->count > 1) { # Multiple accounts for username
70 $hasError = 1;
71 $errNoBorrowerFound = 1;
73 elsif ( $email && $search_results->count > 1) { # Muliple accounts for E-Mail
74 $hasError = 1;
75 $errMultipleAccountsForEmail = 1;
77 elsif ( $borrower = $search_results->next() ) { # One matching borrower
79 if ( $borrower->category->effective_reset_password ) {
81 my @emails = grep { $_ } ( $borrower->email, $borrower->emailpro, $borrower->B_email );
83 my $firstNonEmptyEmail;
84 $firstNonEmptyEmail = $emails[0] if @emails;
86 # Is the given email one of the borrower's ?
87 if ( $email && !( any { /^$email$/i } @emails ) ) {
88 $hasError = 1;
89 $errNoBorrowerFound = 1;
92 # If there is no given email, and there is no email on record
93 elsif ( !$email && !$firstNonEmptyEmail ) {
94 $hasError = 1;
95 $errNoBorrowerEmail = 1;
98 # Check if a password reset already issued for this
99 # borrower AND we are not asking for a new email
100 elsif ( not $query->param('resendEmail') ) {
101 if ( ValidateBorrowernumber( $borrower->borrowernumber ) ) {
102 $hasError = 1;
103 $errAlreadyStartRecovery = 1;
105 else {
106 DeleteExpiredPasswordRecovery( $borrower->borrowernumber );
109 # Set the $email, if we don't have one.
110 if ( !$hasError && !$email ) {
111 $email = $firstNonEmptyEmail;
114 else {
115 $hasError = 1;
116 $errResetForbidden = 1;
119 else { # 0 matching borrower
120 $hasError = 1;
121 $errNoBorrowerFound = 1;
123 if ($hasError) {
124 $template->param(
125 hasError => 1,
127 errNoBorrowerFound => $errNoBorrowerFound,
128 errTooManyEmailFound => $errTooManyEmailFound,
129 errAlreadyStartRecovery => $errAlreadyStartRecovery,
130 errBadEmail => $errBadEmail,
131 errNoBorrowerEmail => $errNoBorrowerEmail,
132 errMultipleAccountsForEmail => $errMultipleAccountsForEmail,
133 errResetForbidden => $errResetForbidden,
134 password_recovery => 1,
135 email => HTML::Entities::encode($email),
136 username => $username
139 elsif ( SendPasswordRecoveryEmail( $borrower, $email, scalar $query->param('resendEmail') ) ) { # generate uuid and send recovery email
140 $template->param(
141 mail_sent => 1,
142 email => $email
145 else { # if it doesn't work....
146 $template->param(
147 hasError => 1,
148 password_recovery => 1,
149 sendmailError => 1
153 elsif ( $query->param('passwordReset') ) {
154 ( $borrower_number, $username ) = GetValidLinkInfo($uniqueKey);
156 my $error;
157 my $min_password_length = C4::Context->preference('minPasswordPreference');
158 my $require_strong_password = C4::Context->preference('RequireStrongPassword');
159 if ( not $borrower_number ) {
160 $error = 'errLinkNotValid';
161 } elsif ( $password ne $repeatPassword ) {
162 $error = 'errPassNotMatch';
163 } else {
164 my $borrower = Koha::Patrons->find($borrower_number);
165 $min_password_length = $borrower->category->effective_min_password_length;
166 $require_strong_password = $borrower->category->effective_require_strong_password;
167 try {
168 $borrower->set_password({ password => $password });
170 CompletePasswordRecovery($uniqueKey);
171 $template->param(
172 password_reset_done => 1,
173 username => $username
176 catch {
177 if ( $_->isa('Koha::Exceptions::Password::TooShort') ) {
178 $error = 'password_too_short';
180 elsif ( $_->isa('Koha::Exceptions::Password::WhitespaceCharacters') ) {
181 $error = 'password_has_whitespaces';
183 elsif ( $_->isa('Koha::Exceptions::Password::TooWeak') ) {
184 $error = 'password_too_weak';
188 if ( $error ) {
189 $template->param(
190 new_password => 1,
191 email => $email,
192 uniqueKey => $uniqueKey,
193 hasError => 1,
194 $error => 1,
195 minPasswordLength => $min_password_length,
196 RequireStrongPassword => $require_strong_password
200 elsif ($uniqueKey) { #reset password form
201 #check if the link is valid
202 ( $borrower_number, $username ) = GetValidLinkInfo($uniqueKey);
204 if ( !$borrower_number ) {
205 $errLinkNotValid = 1;
208 my $borrower = Koha::Patrons->find($borrower_number);
210 $template->param(
211 new_password => 1,
212 email => $email,
213 uniqueKey => $uniqueKey,
214 username => $username,
215 errLinkNotValid => $errLinkNotValid,
216 hasError => ( $errLinkNotValid ? 1 : 0 ),
217 minPasswordLength => $borrower->category->effective_min_password_length,
218 RequireStrongPassword => $borrower->category->effective_require_strong_password
221 else { #password recovery form (to send email)
222 $template->param( password_recovery => 1 );
225 output_html_with_http_headers $query, $cookie, $template->output;