@@ -332,7 +332,7 @@ def create_existing_om(self):
332
332
def get_om_and_init_invite (self ):
333
333
with assume_test_silo_mode (SiloMode .REGION ), outbox_runner ():
334
334
om = OrganizationMember .objects .create (
335
- email = "newuser@example.com" ,
335
+ email = self . user . email ,
336
336
role = "member" ,
337
337
token = "abc" ,
338
338
organization = self .organization ,
@@ -393,7 +393,7 @@ def test_cannot_accept_invite_pending_invite__2fa_required(self):
393
393
with assume_test_silo_mode (SiloMode .REGION ):
394
394
om = OrganizationMember .objects .get (id = om .id )
395
395
assert om .user_id is None
396
- assert om .email == "newuser @example.com"
396
+ assert om .email == "bar @example.com"
397
397
398
398
@mock .patch ("sentry.auth.authenticators.U2fInterface.try_enroll" , return_value = True )
399
399
def test_accept_pending_invite__u2f_enroll (self , try_enroll ):
@@ -489,7 +489,7 @@ def test_org_member_does_not_exist(self, try_enroll, log):
489
489
with assume_test_silo_mode (SiloMode .REGION ):
490
490
om = OrganizationMember .objects .get (id = om .id )
491
491
assert om .user_id is None
492
- assert om .email == "newuser @example.com"
492
+ assert om .email == "bar @example.com"
493
493
494
494
assert log .exception .call_count == 1
495
495
assert log .exception .call_args [0 ][0 ] == "Invalid pending invite cookie"
@@ -511,7 +511,7 @@ def test_invalid_token(self, try_enroll, log):
511
511
with assume_test_silo_mode (SiloMode .REGION ):
512
512
om = OrganizationMember .objects .get (id = om .id )
513
513
assert om .user_id is None
514
- assert om .email == "newuser @example.com"
514
+ assert om .email == "bar @example.com"
515
515
516
516
@mock .patch ("sentry.api.endpoints.user_authenticator_enroll.logger" )
517
517
@mock .patch ("sentry.auth.authenticators.U2fInterface.try_enroll" , return_value = True )
0 commit comments