@@ -156,7 +156,7 @@ func addAuthSourceLDAP(t *testing.T, sshKeyAttribute, groupFilter string, groupM
156156		groupTeamMap  =  groupMapParams [1 ]
157157	}
158158	session  :=  loginUser (t , "user1" )
159- 	csrf  :=  GetCSRF (t , session ,  "/admin/auths/new" )
159+ 	csrf  :=  GetUserCSRFToken (t , session )
160160	req  :=  NewRequestWithValues (t , "POST" , "/admin/auths/new" , buildAuthSourceLDAPPayload (csrf , sshKeyAttribute , groupFilter , groupTeamMap , groupTeamMapRemoval ))
161161	session .MakeRequest (t , req , http .StatusSeeOther )
162162}
@@ -252,7 +252,7 @@ func TestLDAPUserSyncWithEmptyUsernameAttribute(t *testing.T) {
252252	defer  tests .PrepareTestEnv (t )()
253253
254254	session  :=  loginUser (t , "user1" )
255- 	csrf  :=  GetCSRF (t , session ,  "/admin/auths/new" )
255+ 	csrf  :=  GetUserCSRFToken (t , session )
256256	payload  :=  buildAuthSourceLDAPPayload (csrf , "" , "" , "" , "" )
257257	payload ["attribute_username" ] =  "" 
258258	req  :=  NewRequestWithValues (t , "POST" , "/admin/auths/new" , payload )
@@ -487,7 +487,7 @@ func TestLDAPPreventInvalidGroupTeamMap(t *testing.T) {
487487	defer  tests .PrepareTestEnv (t )()
488488
489489	session  :=  loginUser (t , "user1" )
490- 	csrf  :=  GetCSRF (t , session ,  "/admin/auths/new" )
490+ 	csrf  :=  GetUserCSRFToken (t , session )
491491	req  :=  NewRequestWithValues (t , "POST" , "/admin/auths/new" , buildAuthSourceLDAPPayload (csrf , "" , "" , `{"NOT_A_VALID_JSON"["MISSING_DOUBLE_POINT"]}` , "off" ))
492492	session .MakeRequest (t , req , http .StatusOK ) // StatusOK = failed, StatusSeeOther = ok 
493493}
0 commit comments