Skip to content

Commit 8574918

Browse files
committed
fix tests
1 parent 3d902c8 commit 8574918

File tree

4 files changed

+8
-35
lines changed

4 files changed

+8
-35
lines changed

options/locale/locale_en-US.ini

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,8 +220,6 @@ string.desc = Z - A
220220
[error]
221221
occurred = An error occurred
222222
report_message = If you believe that this is a Gitea bug, please search for issues on <a href="%s" target="_blank">GitHub</a> or open a new issue if necessary.
223-
missing_csrf = Bad Request: no CSRF token present
224-
invalid_csrf = Bad Request: invalid CSRF token
225223
not_found = The target couldn't be found.
226224
network_error = Network error
227225

tests/integration/attachment_test.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@ func createAttachment(t *testing.T, session *TestSession, repoURL, filename stri
5959
func TestCreateAnonymousAttachment(t *testing.T) {
6060
defer tests.PrepareTestEnv(t)()
6161
session := emptyTestSession(t)
62-
createAttachment(t, session, "user2/repo1", "image.png", generateImg(), http.StatusSeeOther)
62+
// this test is not right because it just doesn't pass the CSRF validation
63+
createAttachment(t, session, "user2/repo1", "image.png", generateImg(), http.StatusBadRequest)
6364
}
6465

6566
func TestCreateIssueAttachment(t *testing.T) {

tests/integration/csrf_test.go

Lines changed: 4 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,10 @@ package integration
55

66
import (
77
"net/http"
8-
"strings"
98
"testing"
109

1110
"code.gitea.io/gitea/models/unittest"
1211
user_model "code.gitea.io/gitea/models/user"
13-
"code.gitea.io/gitea/modules/setting"
1412
"code.gitea.io/gitea/tests"
1513

1614
"github.com/stretchr/testify/assert"
@@ -25,28 +23,12 @@ func TestCsrfProtection(t *testing.T) {
2523
req := NewRequestWithValues(t, "POST", "/user/settings", map[string]string{
2624
"_csrf": "fake_csrf",
2725
})
28-
session.MakeRequest(t, req, http.StatusSeeOther)
29-
30-
resp := session.MakeRequest(t, req, http.StatusSeeOther)
31-
loc := resp.Header().Get("Location")
32-
assert.Equal(t, setting.AppSubURL+"/", loc)
33-
resp = session.MakeRequest(t, NewRequest(t, "GET", loc), http.StatusOK)
34-
htmlDoc := NewHTMLParser(t, resp.Body)
35-
assert.Equal(t, "Bad Request: invalid CSRF token",
36-
strings.TrimSpace(htmlDoc.doc.Find(".ui.message").Text()),
37-
)
26+
resp := session.MakeRequest(t, req, http.StatusBadRequest)
27+
assert.Contains(t, resp.Body.String(), "Invalid CSRF token")
3828

3929
// test web form csrf via header. TODO: should use an UI api to test
4030
req = NewRequest(t, "POST", "/user/settings")
4131
req.Header.Add("X-Csrf-Token", "fake_csrf")
42-
session.MakeRequest(t, req, http.StatusSeeOther)
43-
44-
resp = session.MakeRequest(t, req, http.StatusSeeOther)
45-
loc = resp.Header().Get("Location")
46-
assert.Equal(t, setting.AppSubURL+"/", loc)
47-
resp = session.MakeRequest(t, NewRequest(t, "GET", loc), http.StatusOK)
48-
htmlDoc = NewHTMLParser(t, resp.Body)
49-
assert.Equal(t, "Bad Request: invalid CSRF token",
50-
strings.TrimSpace(htmlDoc.doc.Find(".ui.message").Text()),
51-
)
32+
resp = session.MakeRequest(t, req, http.StatusBadRequest)
33+
assert.Contains(t, resp.Body.String(), "Invalid CSRF token")
5234
}

tests/integration/repo_branch_test.go

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ import (
1717
repo_model "code.gitea.io/gitea/models/repo"
1818
"code.gitea.io/gitea/models/unit"
1919
"code.gitea.io/gitea/models/unittest"
20-
"code.gitea.io/gitea/modules/setting"
2120
api "code.gitea.io/gitea/modules/structs"
2221
"code.gitea.io/gitea/modules/test"
2322
"code.gitea.io/gitea/modules/translation"
@@ -146,15 +145,8 @@ func TestCreateBranchInvalidCSRF(t *testing.T) {
146145
"_csrf": "fake_csrf",
147146
"new_branch_name": "test",
148147
})
149-
resp := session.MakeRequest(t, req, http.StatusSeeOther)
150-
loc := resp.Header().Get("Location")
151-
assert.Equal(t, setting.AppSubURL+"/", loc)
152-
resp = session.MakeRequest(t, NewRequest(t, "GET", loc), http.StatusOK)
153-
htmlDoc := NewHTMLParser(t, resp.Body)
154-
assert.Equal(t,
155-
"Bad Request: invalid CSRF token",
156-
strings.TrimSpace(htmlDoc.doc.Find(".ui.message").Text()),
157-
)
148+
resp := session.MakeRequest(t, req, http.StatusBadRequest)
149+
assert.Contains(t, resp.Body.String(), "Invalid CSRF token")
158150
}
159151

160152
func prepareBranch(t *testing.T, session *TestSession, repo *repo_model.Repository) {

0 commit comments

Comments
 (0)