Skip to content

Commit 27f30b0

Browse files
committed
Remove Broken Test
Issue gh-8518
1 parent baa238e commit 27f30b0

File tree

1 file changed

+7
-23
lines changed

1 file changed

+7
-23
lines changed

web/src/test/java/org/springframework/security/web/server/csrf/CsrfWebFilterTests.java

Lines changed: 7 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright 2002-2020 the original author or authors.
2+
* Copyright 2002-2017 the original author or authors.
33
*
44
* Licensed under the Apache License, Version 2.0 (the "License");
55
* you may not use this file except in compliance with the License.
@@ -20,14 +20,10 @@
2020
import org.junit.runner.RunWith;
2121
import org.mockito.Mock;
2222
import org.mockito.junit.MockitoJUnitRunner;
23-
24-
import org.springframework.http.HttpMethod;
2523
import org.springframework.http.HttpStatus;
2624
import org.springframework.http.MediaType;
2725
import org.springframework.mock.http.server.reactive.MockServerHttpRequest;
2826
import org.springframework.mock.web.server.MockServerWebExchange;
29-
import org.springframework.security.web.server.util.matcher.ServerWebExchangeMatcher;
30-
import org.springframework.security.web.server.util.matcher.ServerWebExchangeMatcher.MatchResult;
3127
import org.springframework.web.server.WebFilterChain;
3228
import org.springframework.web.server.WebSession;
3329
import reactor.core.publisher.Mono;
@@ -37,11 +33,9 @@
3733
import static org.assertj.core.api.AssertionsForInterfaceTypes.assertThat;
3834
import static org.mockito.ArgumentMatchers.any;
3935
import static org.mockito.Mockito.when;
40-
import static org.springframework.mock.web.server.MockServerWebExchange.from;
4136

4237
/**
4338
* @author Rob Winch
44-
* @author Parikshit Dutta
4539
* @since 5.0
4640
*/
4741
@RunWith(MockitoJUnitRunner.class)
@@ -55,10 +49,10 @@ public class CsrfWebFilterTests {
5549

5650
private CsrfWebFilter csrfFilter = new CsrfWebFilter();
5751

58-
private MockServerWebExchange get = from(
52+
private MockServerWebExchange get = MockServerWebExchange.from(
5953
MockServerHttpRequest.get("/"));
6054

61-
private MockServerWebExchange post = from(
55+
private MockServerWebExchange post = MockServerWebExchange.from(
6256
MockServerHttpRequest.post("/"));
6357

6458
@Test
@@ -110,7 +104,7 @@ public void filterWhenPostAndEstablishedCsrfTokenAndRequestParamInvalidTokenThen
110104
this.csrfFilter.setCsrfTokenRepository(this.repository);
111105
when(this.repository.loadToken(any()))
112106
.thenReturn(Mono.just(this.token));
113-
this.post = from(MockServerHttpRequest.post("/")
107+
this.post = MockServerWebExchange.from(MockServerHttpRequest.post("/")
114108
.body(this.token.getParameterName() + "="+this.token.getToken()+"INVALID"));
115109

116110
Mono<Void> result = this.csrfFilter.filter(this.post, this.chain);
@@ -131,7 +125,7 @@ public void filterWhenPostAndEstablishedCsrfTokenAndRequestParamValidTokenThenCo
131125
.thenReturn(Mono.just(this.token));
132126
when(this.repository.generateToken(any()))
133127
.thenReturn(Mono.just(this.token));
134-
this.post = from(MockServerHttpRequest.post("/")
128+
this.post = MockServerWebExchange.from(MockServerHttpRequest.post("/")
135129
.contentType(MediaType.APPLICATION_FORM_URLENCODED)
136130
.body(this.token.getParameterName() + "="+this.token.getToken()));
137131

@@ -148,7 +142,7 @@ public void filterWhenPostAndEstablishedCsrfTokenAndHeaderInvalidTokenThenCsrfEx
148142
this.csrfFilter.setCsrfTokenRepository(this.repository);
149143
when(this.repository.loadToken(any()))
150144
.thenReturn(Mono.just(this.token));
151-
this.post = from(MockServerHttpRequest.post("/")
145+
this.post = MockServerWebExchange.from(MockServerHttpRequest.post("/")
152146
.header(this.token.getHeaderName(), this.token.getToken()+"INVALID"));
153147

154148
Mono<Void> result = this.csrfFilter.filter(this.post, this.chain);
@@ -169,7 +163,7 @@ public void filterWhenPostAndEstablishedCsrfTokenAndHeaderValidTokenThenContinue
169163
.thenReturn(Mono.just(this.token));
170164
when(this.repository.generateToken(any()))
171165
.thenReturn(Mono.just(this.token));
172-
this.post = from(MockServerHttpRequest.post("/")
166+
this.post = MockServerWebExchange.from(MockServerHttpRequest.post("/")
173167
.header(this.token.getHeaderName(), this.token.getToken()));
174168

175169
Mono<Void> result = this.csrfFilter.filter(this.post, this.chain);
@@ -179,14 +173,4 @@ public void filterWhenPostAndEstablishedCsrfTokenAndHeaderValidTokenThenContinue
179173

180174
chainResult.assertWasSubscribed();
181175
}
182-
183-
@Test
184-
// gh-8452
185-
public void matchesRequireCsrfProtectionWhenNonStandardHTTPMethodIsUsed() {
186-
HttpMethod customHttpMethod = HttpMethod.resolve("non-standard-http-method");
187-
MockServerWebExchange nonStandardHttpRequest = from(MockServerHttpRequest.method(customHttpMethod, "/"));
188-
189-
ServerWebExchangeMatcher serverWebExchangeMatcher = CsrfWebFilter.DEFAULT_CSRF_MATCHER;
190-
assertThat(serverWebExchangeMatcher.matches(nonStandardHttpRequest).map(MatchResult::isMatch).block()).isTrue();
191-
}
192176
}

0 commit comments

Comments
 (0)