Test plan:
Deregister 2FA for patron.
Check if secret is empty in borrowers.secret.
Signed-off-by: Marcel de Rooy <m.de.rooy@rijksmuseum.nl>
Signed-off-by: Martin Renvoize <martin.renvoize@ptfs-europe.com>
Signed-off-by: Jonathan Druart <jonathan.druart@bugs.koha-community.org>
Signed-off-by: Fridolin Somers <fridolin.somers@biblibre.com>
- $logged_in_user->secret($secret32);
- $op = 'registered';
-
# FIXME Generate a (new?) secret
# FIXME Generate a (new?) secret
+ $logged_in_user->secret($secret32);
$logged_in_user->auth_method('two-factor')->store;
$logged_in_user->auth_method('two-factor')->store;
}
else {
$template->param( invalid_pin => 1, );
}
else {
$template->param( invalid_pin => 1, );
}
if ( $op eq 'enable-2FA' ) {
}
if ( $op eq 'enable-2FA' ) {
my $secret = Koha::AuthUtils::generate_salt( 'weak', 16 );
my $auth = Koha::Auth::TwoFactorAuth->new(
{ patron => $logged_in_user, secret => $secret } );
my $secret = Koha::AuthUtils::generate_salt( 'weak', 16 );
my $auth = Koha::Auth::TwoFactorAuth->new(
{ patron => $logged_in_user, secret => $secret } );
elsif ( $op eq 'disable-2FA' ) {
output_and_exit( $cgi, $cookie, $template, 'wrong_csrf_token' )
unless Koha::Token->new->check_csrf($csrf_pars);
elsif ( $op eq 'disable-2FA' ) {
output_and_exit( $cgi, $cookie, $template, 'wrong_csrf_token' )
unless Koha::Token->new->check_csrf($csrf_pars);
+ $logged_in_user->secret(undef);
$logged_in_user->auth_method('password')->store;
}
$logged_in_user->auth_method('password')->store;
}