@@ -65,8 +65,10 @@ void doUploadIcon(JenkinsRule r) throws Exception {
65
65
r .jenkins .setAuthorizationStrategy (strategy );
66
66
67
67
// unauthenticated
68
- assertThrows (AccessDeniedException .class , () -> descriptor .doUploadIcon (mockRequest , null ));
69
- assertThrows (AccessDeniedException .class , () -> descriptor .doUploadIcon (mockRequest , project ));
68
+ try (ACLContext ignored = ACL .as2 (Jenkins .ANONYMOUS2 )) {
69
+ assertThrows (AccessDeniedException .class , () -> descriptor .doUploadIcon (mockRequest , null ));
70
+ assertThrows (AccessDeniedException .class , () -> descriptor .doUploadIcon (mockRequest , project ));
71
+ }
70
72
71
73
// Item.READ
72
74
try (ACLContext ignored = ACL .as (User .get (READ_USER , true , Collections .emptyMap ()))) {
@@ -127,8 +129,10 @@ void doCleanup(JenkinsRule r) throws Exception {
127
129
r .jenkins .setAuthorizationStrategy (strategy );
128
130
129
131
// unauthenticated
130
- assertThrows (AccessDeniedException .class , () -> descriptor .doCleanup (null ));
131
- assertTrue (file .exists ());
132
+ try (ACLContext ignored = ACL .as2 (Jenkins .ANONYMOUS2 )) {
133
+ assertThrows (AccessDeniedException .class , () -> descriptor .doCleanup (null ));
134
+ assertTrue (file .exists ());
135
+ }
132
136
133
137
// Jenkins.READ
134
138
try (ACLContext ignored = ACL .as (User .get (READ_USER , true , Collections .emptyMap ()))) {
@@ -167,7 +171,9 @@ void getDiskUsage(JenkinsRule r) {
167
171
r .jenkins .setAuthorizationStrategy (strategy );
168
172
169
173
// unauthenticated
170
- assertThrows (AccessDeniedException .class , descriptor ::getDiskUsage );
174
+ try (ACLContext ignored = ACL .as2 (Jenkins .ANONYMOUS2 )) {
175
+ assertThrows (AccessDeniedException .class , descriptor ::getDiskUsage );
176
+ }
171
177
172
178
// Jenkins.READ
173
179
try (ACLContext ignored = ACL .as (User .get (READ_USER , true , Collections .emptyMap ()))) {
0 commit comments