18
18
19
19
from django .contrib .auth import get_user_model
20
20
from django .contrib .auth .models import User as DjangoUserModel
21
- from django .test import TestCase , override_settings
22
21
from django .core .exceptions import ImproperlyConfigured
23
- from djangosaml2 .backends import (Saml2Backend , get_model , get_saml_user_model , set_attribute ,
24
- get_django_user_lookup_attribute , get_django_user_lookup_attribute ,
25
- get_saml_user_model )
22
+ from django .test import TestCase , override_settings
23
+
24
+ from djangosaml2 .backends import (Saml2Backend ,
25
+ get_django_user_lookup_attribute , get_model ,
26
+ get_saml_user_model , set_attribute )
26
27
27
28
from .models import TestUser
28
29
@@ -190,9 +191,8 @@ def test_invalid_model_attribute_log(self):
190
191
logs .output ,
191
192
)
192
193
193
- @override_settings (AUTH_USER_MODEL = 'testprofiles.RequiredFieldUser' )
194
+ @override_settings (SAML_USER_MODEL = 'testprofiles.RequiredFieldUser' )
194
195
def test_create_user_with_required_fields (self ):
195
- backend = Saml2Backend ()
196
196
attribute_mapping = {
197
197
'mail' : ['email' ],
198
198
'mail_verified' : ['email_verified' ]
@@ -202,12 +202,16 @@ def test_create_user_with_required_fields(self):
202
202
'mail_verified' : [True ],
203
203
}
204
204
# User creation does not fail if several fields are required.
205
- user = backend ._get_or_create_saml2_user (
205
+ user , created = self .backend .get_or_create_user (
206
+ get_django_user_lookup_attribute (get_saml_user_model ()),
206
207
207
- attributes ,
208
- attribute_mapping ,
208
+ True
209
209
)
210
+
210
211
self .
assertEquals (
user .
email ,
'[email protected] ' )
212
+ self .assertIs (user .email_verified , None )
213
+
214
+ user = self .backend ._update_user (user , attributes , attribute_mapping , created )
211
215
self .assertIs (user .email_verified , True )
212
216
213
217
def test_django_user_main_attribute (self ):
0 commit comments