Bug 24545: Fix license statements
[srvgit] / t / db_dependent / api / v1 / patrons.t
index 26e241b..0d52f99 100644 (file)
 
 # This file is part of Koha.
 #
-# Koha is free software; you can redistribute it and/or modify it under the
-# terms of the GNU General Public License as published by the Free Software
-# Foundation; either version 3 of the License, or (at your option) any later
-# version.
+# Koha is free software; you can redistribute it and/or modify it
+# under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
 #
-# Koha is distributed in the hope that it will be useful, but WITHOUT ANY
-# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
-# A PARTICULAR PURPOSE.  See the GNU General Public License for more details.
+# Koha is distributed in the hope that it will be useful, but
+# WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
 #
-# You should have received a copy of the GNU General Public License along
-# with Koha; if not, write to the Free Software Foundation, Inc.,
-# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+# You should have received a copy of the GNU General Public License
+# along with Koha; if not, see <http://www.gnu.org/licenses>.
 
 use Modern::Perl;
 
-use Test::More tests => 5;
+use Test::More tests => 7;
 use Test::Mojo;
+use Test::Warn;
 
 use t::lib::TestBuilder;
 use t::lib::Mocks;
 
 use C4::Auth;
 use Koha::Database;
+use Koha::Patron::Debarments qw/AddDebarment/;
 
 my $schema  = Koha::Database->new->schema;
 my $builder = t::lib::TestBuilder->new;
 
-# FIXME: sessionStorage defaults to mysql, but it seems to break transaction handling
-# this affects the other REST api tests
-t::lib::Mocks::mock_preference( 'SessionStorage', 'tmp' );
-
-my $remote_address = '127.0.0.1';
-my $t              = Test::Mojo->new('Koha::REST::V1');
+my $t = Test::Mojo->new('Koha::REST::V1');
+t::lib::Mocks::mock_preference( 'RESTBasicAuth', 1 );
 
 subtest 'list() tests' => sub {
     plan tests => 2;
 
     $schema->storage->txn_begin;
-
     unauthorized_access_tests('GET', undef, undef);
+    $schema->storage->txn_rollback;
 
     subtest 'librarian access tests' => sub {
-        plan tests => 8;
-
-        my ($borrowernumber, $sessionid) = create_user_and_session({
-            authorized => 1 });
-        my $patron = Koha::Patrons->find($borrowernumber);
-        Koha::Patrons->search({
-            borrowernumber => { '!=' => $borrowernumber},
-            cardnumber => { LIKE => $patron->cardnumber . "%" }
-        })->delete;
-        Koha::Patrons->search({
-            borrowernumber => { '!=' => $borrowernumber},
-            address2 => { LIKE => $patron->address2 . "%" }
-        })->delete;
-
-        my $tx = $t->ua->build_tx(GET => '/api/v1/patrons');
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $tx->req->env({REMOTE_ADDR => '127.0.0.1'});
-        $t->request_ok($tx)
+        plan tests => 13;
+
+        $schema->storage->txn_begin;
+
+        my $librarian = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 2**4 }    # borrowers flag = 4
+            }
+        );
+        my $password = 'thePassword123';
+        $librarian->set_password( { password => $password, skip_validation => 1 } );
+        my $userid = $librarian->userid;
+
+        $t->get_ok("//$userid:$password@/api/v1/patrons")
           ->status_is(200);
 
-        $tx = $t->ua->build_tx(GET => '/api/v1/patrons?cardnumber='.
-                                  $patron->cardnumber);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $tx->req->env({REMOTE_ADDR => '127.0.0.1'});
-        $t->request_ok($tx)
+        $t->get_ok("//$userid:$password@/api/v1/patrons?cardnumber=" . $librarian->cardnumber)
           ->status_is(200)
-          ->json_is('/0/cardnumber' => $patron->cardnumber);
+          ->json_is('/0/cardnumber' => $librarian->cardnumber);
 
-        $tx = $t->ua->build_tx(GET => '/api/v1/patrons?address2='.
-                                  $patron->address2);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $tx->req->env({REMOTE_ADDR => '127.0.0.1'});
-        $t->request_ok($tx)
+        $t->get_ok("//$userid:$password@/api/v1/patrons?address2=" . $librarian->address2)
           ->status_is(200)
-          ->json_is('/0/address2' => $patron->address2);
-    };
+          ->json_is('/0/address2' => $librarian->address2);
 
-    $schema->storage->txn_rollback;
+        my $patron = $builder->build_object({ class => 'Koha::Patrons' });
+        AddDebarment({ borrowernumber => $patron->borrowernumber });
+
+        $t->get_ok("//$userid:$password@/api/v1/patrons?restricted=" . Mojo::JSON->true . "&cardnumber=" . $patron->cardnumber )
+          ->status_is(200)
+          ->json_has('/0/restricted')
+          ->json_is( '/0/restricted' => Mojo::JSON->true )
+          ->json_hasnt('/1');
+
+        $schema->storage->txn_rollback;
+    };
 };
 
 subtest 'get() tests' => sub {
-    plan tests => 3;
+    plan tests => 2;
 
     $schema->storage->txn_begin;
-
     unauthorized_access_tests('GET', -1, undef);
+    $schema->storage->txn_rollback;
 
-    subtest 'access own object tests' => sub {
-        plan tests => 4;
-
-        my ($patronid, $patronsessionid) = create_user_and_session({
-            authorized => 0 });
+    subtest 'librarian access tests' => sub {
+        plan tests => 6;
 
-        # Access patron's own data even though they have no borrowers flag
-        my $tx = $t->ua->build_tx(GET => "/api/v1/patrons/$patronid");
-        $tx->req->cookies({name => 'CGISESSID', value => $patronsessionid});
-        $tx->req->env({REMOTE_ADDR => '127.0.0.1'});
-        $t->request_ok($tx)
-          ->status_is(200);
+        $schema->storage->txn_begin;
 
-        my $guarantee = $builder->build({
-            source => 'Borrower',
-            value  => {
-                guarantorid => $patronid,
+        my $librarian = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 2**4 }    # borrowers flag = 4
             }
-        });
-
-        # Access guarantee's data even though guarantor has no borrowers flag
-        my $guaranteenumber = $guarantee->{borrowernumber};
-        $tx = $t->ua->build_tx(GET => "/api/v1/patrons/$guaranteenumber");
-        $tx->req->cookies({name => 'CGISESSID', value => $patronsessionid});
-        $tx->req->env({REMOTE_ADDR => '127.0.0.1'});
-        $t->request_ok($tx)
-          ->status_is(200);
-    };
+        );
+        my $password = 'thePassword123';
+        $librarian->set_password( { password => $password, skip_validation => 1 } );
+        my $userid = $librarian->userid;
 
-    subtest 'librarian access tests' => sub {
-        plan tests => 5;
+        my $patron = $builder->build_object({ class => 'Koha::Patrons' });
 
-        my ($patron_id) = create_user_and_session({
-            authorized => 0 });
-        my $patron = Koha::Patrons->find($patron_id);
-        my ($borrowernumber, $sessionid) = create_user_and_session({
-            authorized => 1 });
-        my $tx = $t->ua->build_tx(GET => "/api/v1/patrons/$patron_id");
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        $t->get_ok("//$userid:$password@/api/v1/patrons/" . $patron->id)
           ->status_is(200)
-          ->json_is('/borrowernumber' => $patron_id)
-          ->json_is('/surname' => $patron->surname)
-          ->json_is('/lost' => Mojo::JSON->false );
-    };
+          ->json_is('/patron_id'        => $patron->id)
+          ->json_is('/category_id'      => $patron->categorycode )
+          ->json_is('/surname'          => $patron->surname)
+          ->json_is('/patron_card_lost' => Mojo::JSON->false );
 
-    $schema->storage->txn_rollback;
+        $schema->storage->txn_rollback;
+    };
 };
 
 subtest 'add() tests' => sub {
@@ -145,181 +120,321 @@ subtest 'add() tests' => sub {
 
     $schema->storage->txn_begin;
 
-    my $categorycode = $builder->build({ source => 'Category' })->{categorycode};
-    my $branchcode = $builder->build({ source => 'Branch' })->{branchcode};
-    my $newpatron = {
-        address      => 'Street',
-        branchcode   => $branchcode,
-        cardnumber   => $branchcode.$categorycode,
-        categorycode => $categorycode,
-        city         => 'Joenzoo',
-        surname      => "TestUser",
-        userid       => $branchcode.$categorycode,
-    };
+    my $patron = $builder->build_object( { class => 'Koha::Patrons' } )->to_api;
 
-    unauthorized_access_tests('POST', undef, $newpatron);
+    unauthorized_access_tests('POST', undef, $patron);
+
+    $schema->storage->txn_rollback;
 
     subtest 'librarian access tests' => sub {
-        plan tests => 18;
+        plan tests => 21;
+
+        $schema->storage->txn_begin;
+
+        my $patron = $builder->build_object({ class => 'Koha::Patrons' });
+        my $newpatron = $patron->to_api;
+        # delete RO attributes
+        delete $newpatron->{patron_id};
+        delete $newpatron->{restricted};
+        delete $newpatron->{anonymized};
+
+        # Create a library just to make sure its ID doesn't exist on the DB
+        my $library_to_delete = $builder->build_object({ class => 'Koha::Libraries' });
+        my $deleted_library_id = $library_to_delete->id;
+        # Delete library
+        $library_to_delete->delete;
+
+        my $librarian = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 2**4 }    # borrowers flag = 4
+            }
+        );
+        my $password = 'thePassword123';
+        $librarian->set_password( { password => $password, skip_validation => 1 } );
+        my $userid = $librarian->userid;
 
-        my ($borrowernumber, $sessionid) = create_user_and_session({
-            authorized => 1 });
+        $newpatron->{library_id} = $deleted_library_id;
 
-        $newpatron->{branchcode} = "nonexistent"; # Test invalid branchcode
-        my $tx = $t->ua->build_tx(POST => "/api/v1/patrons" => json => $newpatron );
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
-          ->status_is(400)
-          ->json_is('/error' => "Given branchcode does not exist");
-        $newpatron->{branchcode} = $branchcode;
+        warning_like {
+            $t->post_ok("//$userid:$password@/api/v1/patrons" => json => $newpatron)
+              ->status_is(409)
+              ->json_is('/error' => "Duplicate ID"); }
+            qr/^DBD::mysql::st execute failed: Duplicate entry/;
 
-        $newpatron->{categorycode} = "nonexistent"; # Test invalid patron category
-        $tx = $t->ua->build_tx(POST => "/api/v1/patrons" => json => $newpatron);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        $newpatron->{library_id} = $patron->branchcode;
+
+        # Create a library just to make sure its ID doesn't exist on the DB
+        my $category_to_delete = $builder->build_object({ class => 'Koha::Patron::Categories' });
+        my $deleted_category_id = $category_to_delete->id;
+        # Delete library
+        $category_to_delete->delete;
+
+        $newpatron->{category_id} = $deleted_category_id; # Test invalid patron category
+
+        $t->post_ok("//$userid:$password@/api/v1/patrons" => json => $newpatron)
           ->status_is(400)
-          ->json_is('/error' => "Given categorycode does not exist");
-        $newpatron->{categorycode} = $categorycode;
+          ->json_is('/error' => "Given category_id does not exist");
+        $newpatron->{category_id} = $patron->categorycode;
 
         $newpatron->{falseproperty} = "Non existent property";
-        $tx = $t->ua->build_tx(POST => "/api/v1/patrons" => json => $newpatron);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+
+        $t->post_ok("//$userid:$password@/api/v1/patrons" => json => $newpatron)
           ->status_is(400);
+
         delete $newpatron->{falseproperty};
 
-        $tx = $t->ua->build_tx(POST => "/api/v1/patrons" => json => $newpatron);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        my $patron_to_delete = $builder->build_object({ class => 'Koha::Patrons' });
+        $newpatron = $patron_to_delete->to_api;
+        # delete RO attributes
+        delete $newpatron->{patron_id};
+        delete $newpatron->{restricted};
+        delete $newpatron->{anonymized};
+        $patron_to_delete->delete;
+
+        $t->post_ok("//$userid:$password@/api/v1/patrons" => json => $newpatron)
           ->status_is(201, 'Patron created successfully')
-          ->json_has('/borrowernumber', 'got a borrowernumber')
-          ->json_is('/cardnumber', $newpatron->{ cardnumber })
-          ->json_is('/surname' => $newpatron->{ surname })
-          ->json_is('/firstname' => $newpatron->{ firstname });
-        $newpatron->{borrowernumber} = $tx->res->json->{borrowernumber};
-
-        $tx = $t->ua->build_tx(POST => "/api/v1/patrons" => json => $newpatron);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
-          ->status_is(409)
-          ->json_has('/error', 'Fails when trying to POST duplicate'.
-                     ' cardnumber or userid')
-          ->json_has('/conflict', {
-                        userid => $newpatron->{ userid },
-                        cardnumber => $newpatron->{ cardnumber }
-                    }
-            );
+          ->header_like(
+            Location => qr|^\/api\/v1\/patrons/\d*|,
+            'SWAGGER3.4.1'
+          )
+          ->json_has('/patron_id', 'got a patron_id')
+          ->json_is( '/cardnumber' => $newpatron->{ cardnumber })
+          ->json_is( '/surname'    => $newpatron->{ surname })
+          ->json_is( '/firstname'  => $newpatron->{ firstname });
+
+        warning_like {
+            $t->post_ok("//$userid:$password@/api/v1/patrons" => json => $newpatron)
+              ->status_is(409)
+              ->json_has( '/error', 'Fails when trying to POST duplicate cardnumber' )
+              ->json_like( '/conflict' => qr/(borrowers\.)?cardnumber/ ); }
+            qr/^DBD::mysql::st execute failed: Duplicate entry '(.*?)' for key '(borrowers\.)?cardnumber'/;
+
+        $schema->storage->txn_rollback;
     };
-
-    $schema->storage->txn_rollback;
 };
 
 subtest 'update() tests' => sub {
     plan tests => 2;
 
     $schema->storage->txn_begin;
-
     unauthorized_access_tests('PUT', 123, {email => 'nobody@example.com'});
+    $schema->storage->txn_rollback;
 
     subtest 'librarian access tests' => sub {
-        plan tests => 20;
-
-        t::lib::Mocks::mock_preference('minPasswordLength', 1);
-        my ($borrowernumber, $sessionid) = create_user_and_session({ authorized => 1 });
-        my ($borrowernumber2, undef) = create_user_and_session({ authorized => 0 });
+        plan tests => 22;
 
-        my $patron_1  = Koha::Patrons->find($borrowernumber);
-        my $patron_2  = Koha::Patrons->find($borrowernumber2);
-        my $newpatron = $patron_2->TO_JSON;
+        $schema->storage->txn_begin;
 
-        my $tx = $t->ua->build_tx(PUT => "/api/v1/patrons/-1" => json => $newpatron );
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        my $authorized_patron = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 2**4 } # borrowers flag = 4
+            }
+        );
+        my $password = 'thePassword123';
+        $authorized_patron->set_password(
+            { password => $password, skip_validation => 1 } );
+        my $userid = $authorized_patron->userid;
+
+        my $unauthorized_patron = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 0 }
+            }
+        );
+        $unauthorized_patron->set_password( { password => $password, skip_validation => 1 } );
+        my $unauth_userid = $unauthorized_patron->userid;
+
+        my $patron_1  = $authorized_patron;
+        my $patron_2  = $unauthorized_patron;
+        my $newpatron = $unauthorized_patron->to_api;
+        # delete RO attributes
+        delete $newpatron->{patron_id};
+        delete $newpatron->{restricted};
+        delete $newpatron->{anonymized};
+
+        $t->put_ok("//$userid:$password@/api/v1/patrons/-1" => json => $newpatron)
           ->status_is(404)
           ->json_has('/error', 'Fails when trying to PUT nonexistent patron');
 
-        $newpatron->{categorycode} = 'nonexistent';
-        $tx = $t->ua->build_tx(PUT => "/api/v1/patrons/$borrowernumber2" => json => $newpatron );
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
-          ->status_is(400)
-          ->json_is('/error' => "Given categorycode does not exist");
-        $newpatron->{categorycode} = $patron_2->categorycode;
+        # Create a library just to make sure its ID doesn't exist on the DB
+        my $category_to_delete = $builder->build_object({ class => 'Koha::Patron::Categories' });
+        my $deleted_category_id = $category_to_delete->id;
+        # Delete library
+        $category_to_delete->delete;
+
+        # Use an invalid category
+        $newpatron->{category_id} = $deleted_category_id;
 
-        $newpatron->{branchcode} = 'nonexistent';
-        $tx = $t->ua->build_tx(PUT => "/api/v1/patrons/$borrowernumber2" => json => $newpatron );
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        $t->put_ok("//$userid:$password@/api/v1/patrons/" . $patron_2->borrowernumber => json => $newpatron)
           ->status_is(400)
-          ->json_is('/error' => "Given branchcode does not exist");
-        $newpatron->{branchcode} = $patron_2->branchcode;
+          ->json_is('/error' => "Given category_id does not exist");
+
+        # Restore the valid category
+        $newpatron->{category_id} = $patron_2->categorycode;
+
+        # Create a library just to make sure its ID doesn't exist on the DB
+        my $library_to_delete = $builder->build_object({ class => 'Koha::Libraries' });
+        my $deleted_library_id = $library_to_delete->id;
+        # Delete library
+        $library_to_delete->delete;
+
+        # Use an invalid library_id
+        $newpatron->{library_id} = $deleted_library_id;
 
+        warning_like {
+            $t->put_ok("//$userid:$password@/api/v1/patrons/" . $patron_2->borrowernumber => json => $newpatron)
+              ->status_is(400)
+              ->json_is('/error' => "Given library_id does not exist"); }
+            qr/^DBD::mysql::st execute failed: Cannot add or update a child row: a foreign key constraint fails/;
+
+        # Restore the valid library_id
+        $newpatron->{library_id} = $patron_2->branchcode;
+
+        # Use an invalid attribute
         $newpatron->{falseproperty} = "Non existent property";
-        $tx = $t->ua->build_tx(PUT => "/api/v1/patrons/$borrowernumber2" => json => $newpatron );
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+
+        $t->put_ok( "//$userid:$password@/api/v1/patrons/" . $patron_2->borrowernumber => json => $newpatron )
           ->status_is(400)
           ->json_is('/errors/0/message' =>
                     'Properties not allowed: falseproperty.');
+
+        # Get rid of the invalid attribute
         delete $newpatron->{falseproperty};
 
         # Set both cardnumber and userid to already existing values
         $newpatron->{cardnumber} = $patron_1->cardnumber;
         $newpatron->{userid}     = $patron_1->userid;
 
-        $tx = $t->ua->build_tx( PUT => "/api/v1/patrons/$borrowernumber2" => json => $newpatron );
-        $tx->req->cookies({ name => 'CGISESSID', value => $sessionid });
-        $t->request_ok($tx)->status_is(409)
-          ->json_has( '/error' => "Fails when trying to update to an existing cardnumber or userid")
-          ->json_is(  '/conflict',
-                        {
-                            cardnumber => $newpatron->{cardnumber},
-                            userid     => $newpatron->{userid}
-                        }
-          );
-
-        $newpatron->{ cardnumber } = $borrowernumber.$borrowernumber2;
-        $newpatron->{ userid } = "user".$borrowernumber.$borrowernumber2;
-        $newpatron->{ surname } = "user".$borrowernumber.$borrowernumber2;
-
-        $tx = $t->ua->build_tx(PUT => "/api/v1/patrons/" .
-                    $newpatron->{borrowernumber} => json => $newpatron);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        warning_like {
+            $t->put_ok( "//$userid:$password@/api/v1/patrons/" . $patron_2->borrowernumber => json => $newpatron )
+              ->status_is(409)
+              ->json_has( '/error' => "Fails when trying to update to an existing cardnumber or userid")
+              ->json_like( '/conflict' => qr/(borrowers\.)?cardnumber/ ); }
+            qr/^DBD::mysql::st execute failed: Duplicate entry '(.*?)' for key '(borrowers\.)?cardnumber'/;
+
+        $newpatron->{ cardnumber } = $patron_1->id . $patron_2->id;
+        $newpatron->{ userid }     = "user" . $patron_1->id.$patron_2->id;
+        $newpatron->{ surname }    = "user" . $patron_1->id.$patron_2->id;
+
+        $t->put_ok( "//$userid:$password@/api/v1/patrons/" . $patron_2->borrowernumber => json => $newpatron )
           ->status_is(200, 'Patron updated successfully')
           ->json_has($newpatron);
-        is(Koha::Patrons->find($newpatron->{borrowernumber})->cardnumber,
+        is(Koha::Patrons->find( $patron_2->id )->cardnumber,
            $newpatron->{ cardnumber }, 'Patron is really updated!');
-    };
 
-    $schema->storage->txn_rollback;
+        $schema->storage->txn_rollback;
+    };
 };
 
 subtest 'delete() tests' => sub {
     plan tests => 2;
 
     $schema->storage->txn_begin;
-
     unauthorized_access_tests('DELETE', 123, undef);
+    $schema->storage->txn_rollback;
 
     subtest 'librarian access test' => sub {
         plan tests => 4;
 
-        my ($borrowernumber, $sessionid) = create_user_and_session({
-            authorized => 1 });
-        my ($borrowernumber2, $sessionid2) = create_user_and_session({
-            authorized => 0 });
+        $schema->storage->txn_begin;
+
+        my $authorized_patron = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 2**4 }    # borrowers flag = 4
+            }
+        );
+        my $password = 'thePassword123';
+        $authorized_patron->set_password(
+            { password => $password, skip_validation => 1 } );
+        my $userid = $authorized_patron->userid;
 
-        my $tx = $t->ua->build_tx(DELETE => "/api/v1/patrons/-1");
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        $t->delete_ok("//$userid:$password@/api/v1/patrons/-1")
           ->status_is(404, 'Patron not found');
 
-        $tx = $t->ua->build_tx(DELETE => "/api/v1/patrons/$borrowernumber2");
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        my $patron = $builder->build_object({ class => 'Koha::Patrons' });
+
+        $t->delete_ok("//$userid:$password@/api/v1/patrons/" . $patron->borrowernumber)
           ->status_is(200, 'Patron deleted successfully');
+
+        $schema->storage->txn_rollback;
     };
+};
+
+subtest 'guarantors_can_see_charges() tests' => sub {
+
+    plan tests => 11;
+
+    t::lib::Mocks::mock_preference( 'RESTPublicAPI', 1 );
+    t::lib::Mocks::mock_preference( 'RESTBasicAuth', 1 );
+
+    $schema->storage->txn_begin;
+
+    my $patron = $builder->build_object({ class => 'Koha::Patrons', value => { privacy_guarantor_fines => 0 } });
+    my $password = 'thePassword123';
+    $patron->set_password({ password => $password, skip_validation => 1 });
+    my $userid = $patron->userid;
+    my $patron_id = $patron->borrowernumber;
+
+    t::lib::Mocks::mock_preference( 'AllowPatronToSetFinesVisibilityForGuarantor', 0 );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_charges" => json => { allowed => Mojo::JSON->true } )
+      ->status_is( 403 )
+      ->json_is( '/error', 'The current configuration doesn\'t allow the requested action.' );
+
+    t::lib::Mocks::mock_preference( 'AllowPatronToSetFinesVisibilityForGuarantor', 1 );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_charges" => json => { allowed => Mojo::JSON->true } )
+      ->status_is( 200 )
+      ->json_is( {} );
+
+    ok( $patron->discard_changes->privacy_guarantor_fines, 'privacy_guarantor_fines has been set correctly' );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_charges" => json => { allowed => Mojo::JSON->false } )
+      ->status_is( 200 )
+      ->json_is( {} );
+
+    ok( !$patron->discard_changes->privacy_guarantor_fines, 'privacy_guarantor_fines has been set correctly' );
+
+    $schema->storage->txn_rollback;
+};
+
+subtest 'guarantors_can_see_checkouts() tests' => sub {
+
+    plan tests => 11;
+
+    t::lib::Mocks::mock_preference( 'RESTPublicAPI', 1 );
+    t::lib::Mocks::mock_preference( 'RESTBasicAuth', 1 );
+
+    $schema->storage->txn_begin;
+
+    my $patron = $builder->build_object({ class => 'Koha::Patrons', value => { privacy_guarantor_checkouts => 0 } });
+    my $password = 'thePassword123';
+    $patron->set_password({ password => $password, skip_validation => 1 });
+    my $userid = $patron->userid;
+    my $patron_id = $patron->borrowernumber;
+
+    t::lib::Mocks::mock_preference( 'AllowPatronToSetCheckoutsVisibilityForGuarantor', 0 );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_checkouts" => json => { allowed => Mojo::JSON->true } )
+      ->status_is( 403 )
+      ->json_is( '/error', 'The current configuration doesn\'t allow the requested action.' );
+
+    t::lib::Mocks::mock_preference( 'AllowPatronToSetCheckoutsVisibilityForGuarantor', 1 );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_checkouts" => json => { allowed => Mojo::JSON->true } )
+      ->status_is( 200 )
+      ->json_is( {} );
+
+    ok( $patron->discard_changes->privacy_guarantor_checkouts, 'privacy_guarantor_checkouts has been set correctly' );
+
+    $t->put_ok( "//$userid:$password@/api/v1/public/patrons/$patron_id/guarantors/can_see_checkouts" => json => { allowed => Mojo::JSON->false } )
+      ->status_is( 200 )
+      ->json_is( {} );
+
+    ok( !$patron->discard_changes->privacy_guarantor_checkouts, 'privacy_guarantor_checkouts has been set correctly' );
 
     $schema->storage->txn_rollback;
 };
@@ -327,55 +442,32 @@ subtest 'delete() tests' => sub {
 # Centralized tests for 401s and 403s assuming the endpoint requires
 # borrowers flag for access
 sub unauthorized_access_tests {
-    my ($verb, $patronid, $json) = @_;
+    my ($verb, $patron_id, $json) = @_;
 
     my $endpoint = '/api/v1/patrons';
-    $endpoint .= ($patronid) ? "/$patronid" : '';
+    $endpoint .= ($patron_id) ? "/$patron_id" : '';
 
     subtest 'unauthorized access tests' => sub {
         plan tests => 5;
 
-        my $tx = $t->ua->build_tx($verb => $endpoint => json => $json);
-        $t->request_ok($tx)
+        my $verb_ok = lc($verb) . '_ok';
+
+        $t->$verb_ok($endpoint => json => $json)
           ->status_is(401);
 
-        my ($borrowernumber, $sessionid) = create_user_and_session({
-            authorized => 0 });
+        my $unauthorized_patron = $builder->build_object(
+            {
+                class => 'Koha::Patrons',
+                value => { flags => 0 }
+            }
+        );
+        my $password = "thePassword123!";
+        $unauthorized_patron->set_password(
+            { password => $password, skip_validation => 1 } );
+        my $unauth_userid = $unauthorized_patron->userid;
 
-        $tx = $t->ua->build_tx($verb => $endpoint => json => $json);
-        $tx->req->cookies({name => 'CGISESSID', value => $sessionid});
-        $t->request_ok($tx)
+        $t->$verb_ok( "//$unauth_userid:$password\@$endpoint" => json => $json )
           ->status_is(403)
           ->json_has('/required_permissions');
     };
 }
-
-sub create_user_and_session {
-
-    my $args  = shift;
-    my $flags = ( $args->{authorized} ) ? 16 : 0;
-
-    my $user = $builder->build(
-        {
-            source => 'Borrower',
-            value  => {
-                flags => $flags,
-                gonenoaddress => 0,
-                lost => 0,
-                email => 'nobody@example.com',
-                emailpro => 'nobody@example.com',
-                B_email => 'nobody@example.com'
-            }
-        }
-    );
-
-    # Create a session for the authorized user
-    my $session = C4::Auth::get_session('');
-    $session->param( 'number',   $user->{borrowernumber} );
-    $session->param( 'id',       $user->{userid} );
-    $session->param( 'ip',       '127.0.0.1' );
-    $session->param( 'lasttime', time() );
-    $session->flush;
-
-    return ( $user->{borrowernumber}, $session->id );
-}