@@ -102,7 +102,9 @@ func TestSettings(t *testing.T) {
102102 publicTS , _ := testhelpers .NewKratosServer (t , reg )
103103
104104 browserUser1 := testhelpers .NewHTTPClientWithIdentitySessionCookie (t .Context (), t , reg , browserIdentity1 )
105+ browserUser1 .Jar .SetCookies (nosurfx .WithFakeCSRFCookie (t , reg , publicTS .URL ))
105106 browserUser2 := testhelpers .NewHTTPClientWithIdentitySessionCookie (t .Context (), t , reg , browserIdentity2 )
107+ browserUser2 .Jar .SetCookies (nosurfx .WithFakeCSRFCookie (t , reg , publicTS .URL ))
106108 apiUser1 := testhelpers .NewHTTPClientWithIdentitySessionToken (t .Context (), t , reg , apiIdentity1 )
107109 apiUser2 := testhelpers .NewHTTPClientWithIdentitySessionToken (t .Context (), t , reg , apiIdentity2 )
108110
@@ -442,7 +444,7 @@ func TestSettings(t *testing.T) {
442444 assert .Equal (t , http .StatusOK , res .StatusCode )
443445 assert .Contains (t , res .Request .URL .String (), conf .GetProvider (t .Context ()).String (config .ViperKeySelfServiceErrorUI ))
444446
445- assertx .EqualAsJSON (t , nosurfx .ErrInvalidCSRFToken , json .RawMessage (actual ), "%s" , actual )
447+ assertx .EqualAsJSON (t , nosurfx .ErrInvalidCSRFTokenServerTokenMismatch , json .RawMessage (actual ), "%s" , actual )
446448 })
447449
448450 t .Run ("case=should pass even without CSRF token/type=spa" , func (t * testing.T ) {
@@ -455,7 +457,7 @@ func TestSettings(t *testing.T) {
455457 assert .Equal (t , http .StatusForbidden , res .StatusCode )
456458
457459 assert .Contains (t , res .Request .URL .String (), publicTS .URL + settings .RouteSubmitFlow )
458- assertx .EqualAsJSON (t , nosurfx .ErrInvalidCSRFToken , json .RawMessage (gjson .Get (actual , "error" ).Raw ), "%s" , actual )
460+ assertx .EqualAsJSON (t , nosurfx .ErrInvalidCSRFTokenAJAXTokenMismatch , json .RawMessage (gjson .Get (actual , "error" ).Raw ), "%s" , actual )
459461 })
460462
461463 t .Run ("case=should pass even without CSRF token/type=api" , func (t * testing.T ) {
0 commit comments