2021-10-29 12:34:29 -06:00
[[test-mockmvc-csrf]]
= Testing with CSRF Protection
2021-12-13 16:57:36 -06:00
When testing any non-safe HTTP methods and using Spring Security's CSRF protection, you must include a valid CSRF Token in the request.
2021-10-29 12:34:29 -06:00
To specify a valid CSRF token as a request parameter use the CSRF xref:servlet/test/mockmvc/request-post-processors.adoc[`RequestPostProcessor`] like so:
====
.Java
[source,java,role="primary"]
----
mvc
.perform(post("/").with(csrf()))
----
.Kotlin
[source,kotlin,role="secondary"]
----
mvc.post("/") {
with(csrf())
}
----
====
2021-12-13 16:57:36 -06:00
If you like, you can include CSRF token in the header instead:
2021-10-29 12:34:29 -06:00
====
.Java
[source,java,role="primary"]
----
mvc
.perform(post("/").with(csrf().asHeader()))
----
.Kotlin
[source,kotlin,role="secondary"]
----
mvc.post("/") {
with(csrf().asHeader())
}
----
====
2021-12-13 16:57:36 -06:00
You can also test providing an invalid CSRF token by using the following:
2021-10-29 12:34:29 -06:00
====
.Java
[source,java,role="primary"]
----
mvc
.perform(post("/").with(csrf().useInvalidToken()))
----
.Kotlin
[source,kotlin,role="secondary"]
----
mvc.post("/") {
with(csrf().useInvalidToken())
}
----
====