2 #script to set the password, and optionally a userid, for a borrower
5 #converted to using templates 3/16/03 by mwhansen@hmc.edu
20 use Koha::Patron::Categories;
26 my $theme = $input->param('theme') || "default";
28 # only used if allowthemeoverride is set
30 my ( $template, $loggedinuser, $cookie, $staffflags ) = get_template_and_user(
32 template_name => "members/member-password.tt",
35 flagsrequired => { borrowers => 'edit_borrowers' },
39 my $patron_id = $input->param('member');
40 my $destination = $input->param('destination');
41 my $newpassword = $input->param('newpassword');
42 my $newpassword2 = $input->param('newpassword2');
43 my $new_user_id = $input->param('newuserid');
47 my $logged_in_user = Koha::Patrons->find( $loggedinuser );
48 my $patron = Koha::Patrons->find( $patron_id );
49 output_and_exit_if_error( $input, $cookie, $template, { module => 'members', logged_in_user => $logged_in_user, current_patron => $patron } );
51 my $category_type = $patron->category->category_type;
53 if ( ( $patron_id ne $loggedinuser ) && ( $category_type eq 'S' ) ) {
54 push( @errors, 'NOPERMISSION' )
55 unless ( $staffflags->{'superlibrarian'} || $staffflags->{'staffaccess'} );
57 # need superlibrarian for koha-conf.xml fakeuser.
60 push( @errors, 'NOMATCH' ) if ( ( $newpassword && $newpassword2 ) && ( $newpassword ne $newpassword2 ) );
62 if ( $newpassword and not @errors) {
64 output_and_exit( $input, $cookie, $template, 'wrong_csrf_token' )
65 unless Koha::Token->new->check_csrf({
66 session_id => scalar $input->cookie('CGISESSID'),
67 token => scalar $input->param('csrf_token'),
71 $patron->set_password({ password => $newpassword });
72 $patron->userid($new_user_id)->store
73 if $new_user_id and $new_user_id ne $patron->userid;
74 $template->param( newpassword => $newpassword );
75 if ( $destination eq 'circ' ) {
76 print $input->redirect("/cgi-bin/koha/circ/circulation.pl?findborrower=" . $patron->cardnumber);
79 print $input->redirect("/cgi-bin/koha/members/moremember.pl?borrowernumber=$patron_id");
83 if ( $_->isa('Koha::Exceptions::Password::TooShort') ) {
84 push @errors, 'ERROR_password_too_short';
86 elsif ( $_->isa('Koha::Exceptions::Password::WhitespaceCharacters') ) {
87 push @errors, 'ERROR_password_has_whitespaces';
89 elsif ( $_->isa('Koha::Exceptions::Password::TooWeak') ) {
90 push @errors, 'ERROR_password_too_weak';
92 elsif ( $_->isa('Koha::Exceptions::Password::Plugin') ) {
93 push @errors, 'ERROR_from_plugin';
96 push( @errors, 'BADUSERID' );
103 destination => $destination,
104 csrf_token => Koha::Token->new->generate_csrf({ session_id => scalar $input->cookie('CGISESSID'), }),
107 if ( scalar(@errors) ) {
108 $template->param( errormsg => 1 );
109 foreach my $error (@errors) {
110 $template->param($error) || $template->param( $error => 1 );
114 output_html_with_http_headers $input, $cookie, $template->output;