You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@archiva.apache.org by br...@apache.org on 2011/04/13 05:03:54 UTC

svn commit: r1091631 - /archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java

Author: brett
Date: Wed Apr 13 03:03:54 2011
New Revision: 1091631

URL: http://svn.apache.org/viewvc?rev=1091631&view=rev
Log:
accidentally merged Selenium tests that test functionality no longer there

Modified:
    archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java

Modified: archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java
URL: http://svn.apache.org/viewvc/archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java?rev=1091631&r1=1091630&r2=1091631&view=diff
==============================================================================
--- archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java (original)
+++ archiva/trunk/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java Wed Apr 13 03:03:54 2011
@@ -129,21 +129,4 @@ public class CSRFSecurityTest
         assertTextPresent( "Security Alert - Invalid Token Found" );
         assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );
     }
-
-    public void testCSRFUpdateUnprocessedConsumers()
-    {
-        getSelenium().open( baseUrl );
-        getSelenium().open( baseUrl + "/admin/database!updateUnprocessedConsumers.action?enabledUnprocessedConsumers=update-db-project" );
-        assertTextPresent( "Security Alert - Invalid Token Found" );
-        assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );
-    }
-
-    public void testCSRFUpdateCleanupConsumers()
-    {
-        getSelenium().open( baseUrl );
-        getSelenium().open( baseUrl + "/admin/database!updateCleanupConsumers.action?enabledCleanupConsumers=not-present-remove-db-artifact&" +
-            "enabledCleanupConsumers=not-present-remove-db-project&enabledCleanupConsumers=not-present-remove-indexed" );
-        assertTextPresent( "Security Alert - Invalid Token Found" );
-        assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." );    
-    }
 }