@@ -331,7 +331,7 @@ def create_existing_om(self):
331
331
def get_om_and_init_invite (self ):
332
332
with assume_test_silo_mode (SiloMode .REGION ), outbox_runner ():
333
333
om = OrganizationMember .objects .create (
334
- email = "newuser@example.com" ,
334
+ email = self . user . email ,
335
335
role = "member" ,
336
336
token = "abc" ,
337
337
organization = self .organization ,
@@ -392,7 +392,7 @@ def test_cannot_accept_invite_pending_invite__2fa_required(self):
392
392
with assume_test_silo_mode (SiloMode .REGION ):
393
393
om = OrganizationMember .objects .get (id = om .id )
394
394
assert om .user_id is None
395
- assert om .email == "newuser @example.com"
395
+ assert om .email == "bar @example.com"
396
396
397
397
@mock .patch ("sentry.auth.authenticators.U2fInterface.try_enroll" , return_value = True )
398
398
def test_accept_pending_invite__u2f_enroll (self , try_enroll ):
@@ -488,7 +488,7 @@ def test_org_member_does_not_exist(self, try_enroll, log):
488
488
with assume_test_silo_mode (SiloMode .REGION ):
489
489
om = OrganizationMember .objects .get (id = om .id )
490
490
assert om .user_id is None
491
- assert om .email == "newuser @example.com"
491
+ assert om .email == "bar @example.com"
492
492
493
493
assert log .exception .call_count == 1
494
494
assert log .exception .call_args [0 ][0 ] == "Invalid pending invite cookie"
@@ -510,7 +510,7 @@ def test_invalid_token(self, try_enroll, log):
510
510
with assume_test_silo_mode (SiloMode .REGION ):
511
511
om = OrganizationMember .objects .get (id = om .id )
512
512
assert om .user_id is None
513
- assert om .email == "newuser @example.com"
513
+ assert om .email == "bar @example.com"
514
514
515
515
@mock .patch ("sentry.api.endpoints.user_authenticator_enroll.logger" )
516
516
@mock .patch ("sentry.auth.authenticators.U2fInterface.try_enroll" , return_value = True )
0 commit comments