diff options
author | Brett Porter <brett@apache.org> | 2011-04-13 03:03:54 +0000 |
---|---|---|
committer | Brett Porter <brett@apache.org> | 2011-04-13 03:03:54 +0000 |
commit | e064cd7f676d6d8a70b5aa76f427ebf2b0c4dcba (patch) | |
tree | 299852c53dcdb5da6f75c04f347d98877974ae97 /archiva-modules | |
parent | 05d32a457863a6d577d6193693401c52d882d712 (diff) | |
download | archiva-e064cd7f676d6d8a70b5aa76f427ebf2b0c4dcba.tar.gz archiva-e064cd7f676d6d8a70b5aa76f427ebf2b0c4dcba.zip |
accidentally merged Selenium tests that test functionality no longer there
git-svn-id: https://svn.apache.org/repos/asf/archiva/trunk@1091631 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'archiva-modules')
-rw-r--r-- | archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java | 17 |
1 files changed, 0 insertions, 17 deletions
diff --git a/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java b/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java index 3883605a8..5a55ed72f 100644 --- a/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java +++ b/archiva-modules/archiva-web/archiva-webapp-test/src/test/testng/org/apache/archiva/web/test/CSRFSecurityTest.java @@ -129,21 +129,4 @@ public class CSRFSecurityTest assertTextPresent( "Security Alert - Invalid Token Found" ); assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." ); } - - public void testCSRFUpdateUnprocessedConsumers() - { - getSelenium().open( baseUrl ); - getSelenium().open( baseUrl + "/admin/database!updateUnprocessedConsumers.action?enabledUnprocessedConsumers=update-db-project" ); - assertTextPresent( "Security Alert - Invalid Token Found" ); - assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." ); - } - - public void testCSRFUpdateCleanupConsumers() - { - getSelenium().open( baseUrl ); - getSelenium().open( baseUrl + "/admin/database!updateCleanupConsumers.action?enabledCleanupConsumers=not-present-remove-db-artifact&" + - "enabledCleanupConsumers=not-present-remove-db-project&enabledCleanupConsumers=not-present-remove-indexed" ); - assertTextPresent( "Security Alert - Invalid Token Found" ); - assertTextPresent( "Possible CSRF attack detected! Invalid token found in the request." ); - } } |