@@ -156,7 +156,7 @@ func addAuthSourceLDAP(t *testing.T, sshKeyAttribute, groupFilter string, groupM
156156 groupTeamMap = groupMapParams [1 ]
157157 }
158158 session := loginUser (t , "user1" )
159- csrf := GetCSRF (t , session , "/admin/auths/new" )
159+ csrf := GetUserCSRFToken (t , session )
160160 req := NewRequestWithValues (t , "POST" , "/admin/auths/new" , buildAuthSourceLDAPPayload (csrf , sshKeyAttribute , groupFilter , groupTeamMap , groupTeamMapRemoval ))
161161 session .MakeRequest (t , req , http .StatusSeeOther )
162162}
@@ -252,7 +252,7 @@ func TestLDAPUserSyncWithEmptyUsernameAttribute(t *testing.T) {
252252 defer tests .PrepareTestEnv (t )()
253253
254254 session := loginUser (t , "user1" )
255- csrf := GetCSRF (t , session , "/admin/auths/new" )
255+ csrf := GetUserCSRFToken (t , session )
256256 payload := buildAuthSourceLDAPPayload (csrf , "" , "" , "" , "" )
257257 payload ["attribute_username" ] = ""
258258 req := NewRequestWithValues (t , "POST" , "/admin/auths/new" , payload )
@@ -487,7 +487,7 @@ func TestLDAPPreventInvalidGroupTeamMap(t *testing.T) {
487487 defer tests .PrepareTestEnv (t )()
488488
489489 session := loginUser (t , "user1" )
490- csrf := GetCSRF (t , session , "/admin/auths/new" )
490+ csrf := GetUserCSRFToken (t , session )
491491 req := NewRequestWithValues (t , "POST" , "/admin/auths/new" , buildAuthSourceLDAPPayload (csrf , "" , "" , `{"NOT_A_VALID_JSON"["MISSING_DOUBLE_POINT"]}` , "off" ))
492492 session .MakeRequest (t , req , http .StatusOK ) // StatusOK = failed, StatusSeeOther = ok
493493}
0 commit comments