You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@archiva.apache.org by br...@apache.org on 2011/04/13 05:03:54 UTC
svn commit: r1091631 -
/archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java
Author: brett
Date: Wed Apr 13 03:03:54 2011
New Revision: 1091631
URL: http://svn.apache.org/viewvc?rev=1091631&view=rev
Log:
accidentally merged Selenium tests that test functionality no longer there
Modified:
archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java
Modified: archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java
URL: http://svn.apache.org/viewvc/archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java?rev=1091631&r1=1091630&r2=1091631&view=diff
==============================================================================
--- archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java (original)
+++ archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java Wed Apr 13 03:03:54 2011
@@ -129,21 +129,4 @@ public class CSRFSecurityTest
assertTextPresent( "Security Alert - Invalid Token Found" );
assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );
}
-
- public void testCSRFUpdateUnprocessedConsumers()
- {
- getSelenium().open( baseUrl );
- getSelenium().open( baseUrl + "/admin/database!updateUnprocessedConsumers.action?enabledUnprocessedConsumers=update-db-project" );
- assertTextPresent( "Security Alert - Invalid Token Found" );
- assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );
- }
-
- public void testCSRFUpdateCleanupConsumers()
- {
- getSelenium().open( baseUrl );
- getSelenium().open( baseUrl + "/admin/database!updateCleanupConsumers.action?enabledCleanupConsumers=not-present-remove-db-artifact&" +
- "enabledCleanupConsumers=not-present-remove-db-project&enabledCleanupConsumers=not-present-remove-indexed" );
- assertTextPresent( "Security Alert - Invalid Token Found" );
- assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );
- }
}